{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "application-api",
                "resourceVersion": "22833",
                "uid": "0707f2dc-777c-4924-9b76-a7df14ba4ced"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "application-api",
                "resourceVersion": "23598",
                "uid": "f5d65359-7373-4f4f-9869-3e691df20886"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-0",
                "namespace": "application-api",
                "resourceVersion": "23333",
                "uid": "dbd00310-7a0b-477e-830b-bf1016bea398"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-1",
                "namespace": "application-api",
                "resourceVersion": "23323",
                "uid": "e99d18b2-8e1d-40ec-bd16-6811219f9e1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "application-api",
                "resourceVersion": "23398",
                "uid": "480ee9e4-17d6-4b74-8a1c-736deac5e89f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "application-api-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-api/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"application-api-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-api/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"application-api\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:33Z",
                "name": "grant-argocd",
                "namespace": "application-api",
                "resourceVersion": "22057",
                "uid": "f2384323-70e1-4f51-9388-5ce7d77c430e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:deployers",
                "namespace": "application-api",
                "resourceVersion": "19597",
                "uid": "44869c24-0a49-4d87-a50c-dae590e94771"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "application-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-builders",
                "namespace": "application-api",
                "resourceVersion": "19620",
                "uid": "4df94241-49bb-4b9e-8bb0-2c3601722a16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "application-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-pullers",
                "namespace": "application-api",
                "resourceVersion": "19619",
                "uid": "a94d0f1d-f983-4af3-85f1-5f3df882808d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:application-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/application-service-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/application-service-leader-election-rolebinding\"},\"name\":\"application-service-leader-election-rolebinding\",\"namespace\":\"application-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"application-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "application-service-leader-election-rolebinding",
                "namespace": "application-service",
                "resourceVersion": "21593",
                "uid": "a49e23ce-68ac-47c1-ae0c-36abe23df313"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "application-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/application-service-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/application-service-maintainers\"},\"name\":\"application-service-maintainers\",\"namespace\":\"application-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "application-service-maintainers",
                "namespace": "application-service",
                "resourceVersion": "21592",
                "uid": "1911af50-10b6-4ce3-83c5-ba8bd256d40b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "application-service",
                "resourceVersion": "19042",
                "uid": "46959cf6-4624-4c13-a903-04426bade4b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "application-service",
                "resourceVersion": "19034",
                "uid": "e889a020-d217-4001-b243-ce9dd590e7a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admins-0",
                "namespace": "application-service",
                "resourceVersion": "19032",
                "uid": "e4f803e5-9eed-4ea1-8392-722a1e37094e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:49Z",
                "name": "dedicated-admins-1",
                "namespace": "application-service",
                "resourceVersion": "19049",
                "uid": "ffa8c752-2c0b-44be-8eaa-3a077a73491a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "application-service",
                "resourceVersion": "19043",
                "uid": "7a1e7e14-de86-49c6-80b1-f341aee4f805"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"application-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "grant-argocd",
                "namespace": "application-service",
                "resourceVersion": "21607",
                "uid": "fda96008-f4f4-46a7-a92a-afbfb595da88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/has-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/has-admin\"},\"name\":\"has-admin\",\"namespace\":\"application-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"has-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "has-admin",
                "namespace": "application-service",
                "resourceVersion": "21624",
                "uid": "9c1444dd-319d-4518-843f-71de221c03be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "has-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:43Z",
                "name": "system:deployers",
                "namespace": "application-service",
                "resourceVersion": "18950",
                "uid": "79c0f764-4d90-4835-8b30-1db55b4b1625"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:43Z",
                "name": "system:image-builders",
                "namespace": "application-service",
                "resourceVersion": "18948",
                "uid": "f2b22ba7-8bed-411e-a317-fa28ff1c7259"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:43Z",
                "name": "system:image-pullers",
                "namespace": "application-service",
                "resourceVersion": "18949",
                "uid": "75426683-e85a-4044-985e-05905ae5f727"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/view-konflux-integration-runner",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:application-service/view-konflux-integration-runner\"},\"name\":\"view-konflux-integration-runner\",\"namespace\":\"application-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"view\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "view-konflux-integration-runner",
                "namespace": "application-service",
                "resourceVersion": "21594",
                "uid": "eb6387d0-9a2d-4dc6-bcf9-b2f106778b1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:appstudio-cardinality-exporter/appstudio-cardinality-exporter-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:appstudio-cardinality-exporter/appstudio-cardinality-exporter-maintainers\"},\"name\":\"appstudio-cardinality-exporter-maintainers\",\"namespace\":\"appstudio-cardinality-exporter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"kind\":\"Group\",\"name\":\"konflux-o11y\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:10Z",
                "name": "appstudio-cardinality-exporter-maintainers",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "20038",
                "uid": "ab848dec-1cc2-4ed3-93f3-fe6b59ad142f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-o11y"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "22896",
                "uid": "f90699fb-cdac-4c30-94f7-bbadb7c00dbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "23860",
                "uid": "ca21580e-819b-4f1d-b82d-0a0407daab28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "23249",
                "uid": "bb0f439f-2f2b-4ac9-a8bc-95e8a9d56c8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-1",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "23364",
                "uid": "7733aee8-0bf7-4a77-9505-1124d132efb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "24002",
                "uid": "2542d4bf-77f5-498e-a4bb-70399e671c6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:deployers",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "19556",
                "uid": "88e9102b-b7af-47dd-bd47-3a445ccfc9d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-builders",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "19552",
                "uid": "b037b817-5e41-4092-a392-a15bcedaa43c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-pullers",
                "namespace": "appstudio-cardinality-exporter",
                "resourceVersion": "19554",
                "uid": "37d1818e-862e-4b68-b08c-b167a563b216"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "22914",
                "uid": "282bff86-1144-4e74-a377-3d976422ff27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "23368",
                "uid": "34d89b94-5f2f-4ecc-ba51-71dbb05c11e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:42Z",
                "name": "dedicated-admins-0",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "23204",
                "uid": "32389adc-0252-4c1e-805a-445e473fcae1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-1",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "23346",
                "uid": "07a1a993-9ee2-4e55-a128-0ff361848739"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "23978",
                "uid": "4d079ddc-71fc-49c3-bf6f-031155a485b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:25Z",
                "name": "system:deployers",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "21709",
                "uid": "6016b92d-fb66-4193-a848-9d369f6ea4fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "appstudio-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:25Z",
                "name": "system:image-builders",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "21707",
                "uid": "2398d3b8-06c4-4fba-b3e0-59efe8e91ade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "appstudio-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:25Z",
                "name": "system:image-pullers",
                "namespace": "appstudio-monitoring",
                "resourceVersion": "21705",
                "uid": "8799ae03-264d-43a2-b7be-3b052de3ce68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:appstudio-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:appstudio-registry-exporter/appstudio-registry-exporter-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:appstudio-registry-exporter/appstudio-registry-exporter-maintainers\"},\"name\":\"appstudio-registry-exporter-maintainers\",\"namespace\":\"appstudio-registry-exporter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"kind\":\"Group\",\"name\":\"konflux-o11y\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:13Z",
                "name": "appstudio-registry-exporter-maintainers",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "33797",
                "uid": "a5bdbb80-63f6-4076-8550-4bf08915cb07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-o11y"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:14Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "28810",
                "uid": "ef286ed3-2b7f-4f39-a404-e45d5f575526"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:18Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "28957",
                "uid": "dae34cef-bf88-453d-b93d-b701151a9d8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:10Z",
                "name": "dedicated-admins-0",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "28660",
                "uid": "068daa51-7eb1-4b92-9aa1-3edf1a527837"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:16Z",
                "name": "dedicated-admins-1",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "28844",
                "uid": "90c1cea9-e7fe-429c-969b-36f696210569"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:20Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "29084",
                "uid": "f3dc9b0f-acfc-4358-9eac-8cf31e995186"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "system:deployers",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "27411",
                "uid": "643b2954-244e-4ffa-8c4a-31c1c1985ceb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "system:image-builders",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "27410",
                "uid": "6ae2d09b-8507-4198-9fd2-446a2084d214"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "system:image-pullers",
                "namespace": "appstudio-registry-exporter",
                "resourceVersion": "27408",
                "uid": "c7ed991d-9843-478e-ad88-88fe2118f34f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "23080",
                "uid": "e7285c09-6a3b-478e-bffa-afd02ec647a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "23458",
                "uid": "b8d6c9f2-7203-4166-a573-8b84ae696885"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "23257",
                "uid": "c5cb6a48-9ada-4196-b649-41682756a39d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-1",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "23281",
                "uid": "18e81a4d-52ac-4b92-9c55-45d8cb4f735f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "23412",
                "uid": "36471bf9-39a2-4eaa-ae43-c02750e94eaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:deployers",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "19561",
                "uid": "30786163-2b8a-45a5-839c-bc6e4225466c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "appstudio-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-builders",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "19555",
                "uid": "4c4acd76-b399-489d-8f22-ad41869e3703"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "appstudio-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-pullers",
                "namespace": "appstudio-workload-monitoring",
                "resourceVersion": "19560",
                "uid": "bf73d9d5-0a10-41fb-b3d7-aeda7f9a44ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:appstudio-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-ican",
                "resourceVersion": "50262",
                "uid": "891fae14-5bbb-42ef-9aaf-5d2e35bf80c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-ican",
                "resourceVersion": "53324",
                "uid": "51be2b74-493f-429a-b931-031cd17598ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-ican",
                "resourceVersion": "50455",
                "uid": "0ba9a9d5-bc78-488c-b34a-c9cd62e8cad9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:53Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-ican",
                "resourceVersion": "52880",
                "uid": "e49a384f-a91e-4e15-8e5d-fc0885b09eae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:17Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-ican",
                "resourceVersion": "51393",
                "uid": "4fde9de2-d998-4dea-838f-c74c4d16e75b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "458bfcd4-ab4c-4b7b-b128-25e76d4e1f33",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-ican",
                "resourceVersion": "50695",
                "uid": "0f311cb3-224e-47c6-9716-f6f74c4475c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-ican"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:14Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-ican",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "73fa74ab-79ce-4c23-9c38-ba1042c8d30b"
                    }
                ],
                "resourceVersion": "51004",
                "uid": "e64b4480-c807-474f-8051-6cf3cb424dab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:16Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-ican",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "73fa74ab-79ce-4c23-9c38-ba1042c8d30b"
                    }
                ],
                "resourceVersion": "159543",
                "uid": "72df79ad-52e1-40e9-89aa-0edeaf73a946"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-ican"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:09Z",
                "name": "system:deployers",
                "namespace": "build-e2e-ican",
                "resourceVersion": "50160",
                "uid": "ab3f5235-7af9-4ba4-ae34-d7ce3ae9d3d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-ican"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-ican",
                "resourceVersion": "50212",
                "uid": "aebc63a2-bc40-4a75-b6ff-ddb8fa1efa7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-ican"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:09Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-ican",
                "resourceVersion": "50193",
                "uid": "efc84375-2fd9-4df5-874a-83fc0e2d95de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-ican"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:28Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "174251",
                "uid": "e8913453-8842-45c4-b982-35488e54d738"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:23Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "173982",
                "uid": "902c474b-286a-4ee5-9077-1f1c44e3026b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:25Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "174139",
                "uid": "b7f19b88-9b79-4edc-a9ba-6c9074fa6195"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:33Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "174319",
                "uid": "7714c511-c9c8-4eff-8f9e-6813c113008c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:30Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "174279",
                "uid": "6e250206-4991-40ac-b557-b27c27205a2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "b91cbab3-f789-4847-a3c2-458094a61861",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "174073",
                "uid": "11d8b039-7caf-465a-8d22-8c624d83303e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-ickv"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:24Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-ickv",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "29f4aa76-4a5e-4c19-ae0b-6700728badd8"
                    }
                ],
                "resourceVersion": "174050",
                "uid": "5cecbecf-587b-48d3-9046-6adb2350e251"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:24Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-ickv",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "29f4aa76-4a5e-4c19-ae0b-6700728badd8"
                    }
                ],
                "resourceVersion": "174066",
                "uid": "d1ee86c3-7ee7-46d0-9558-f74f6440a6b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-ickv"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:57:23Z",
                "name": "system:deployers",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "173965",
                "uid": "e40da14b-fade-4346-b63b-2da7c448f08d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-ickv"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:57:23Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "173986",
                "uid": "0f4c7bf5-3992-435e-a470-536f4e28bc28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-ickv"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:57:23Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-ickv",
                "resourceVersion": "173963",
                "uid": "b9ccd95d-e21c-4a24-a47d-2312b9febc0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-ickv"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:02Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-issb",
                "resourceVersion": "53634",
                "uid": "a32f07b6-0b10-4d82-94db-2e308ada8f34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:13Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-issb",
                "resourceVersion": "54501",
                "uid": "5903220e-7ad5-4a29-951f-0d249fa4921f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-issb",
                "resourceVersion": "54864",
                "uid": "09d9890b-d387-47f2-a4de-69e540a4c49e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-issb",
                "resourceVersion": "50846",
                "uid": "3d52a20a-5866-4fb3-b519-5ea5c479a1b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:26Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-issb",
                "resourceVersion": "51963",
                "uid": "0c3ea26f-07a3-4f81-9c12-9a19f8101b11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "285ddd36-9193-4ba4-9ab8-15cc32f80d64",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-issb",
                "resourceVersion": "53323",
                "uid": "845fa3af-8716-49d6-8e1d-b8789bfd8490"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-issb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:51Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-issb",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "5d7355ef-3ba4-4a89-b240-174b441077d0"
                    }
                ],
                "resourceVersion": "52560",
                "uid": "2d9f9c0a-b95b-422d-b3db-9e852a906921"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:51Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-issb",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "5d7355ef-3ba4-4a89-b240-174b441077d0"
                    }
                ],
                "resourceVersion": "52615",
                "uid": "feae51b5-1279-4f61-8032-b7f7ffdf8c3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-issb"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:deployers",
                "namespace": "build-e2e-issb",
                "resourceVersion": "50573",
                "uid": "6f40a145-0a61-4850-ac10-41b6aee7ef8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-issb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-issb",
                "resourceVersion": "50581",
                "uid": "a4becc5b-c559-43fb-9d04-e37db9e61f32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-issb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-issb",
                "resourceVersion": "50580",
                "uid": "0413ffc8-261f-4ad4-97fd-d7d4d37abc89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-issb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:11Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "54383",
                "uid": "249339c3-99b1-4a1a-b689-cf01268d4265"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:03Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "53743",
                "uid": "2d05ac92-8955-4da3-bd89-29b1b194635d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:20Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "55452",
                "uid": "ce1488fe-720f-4a88-8129-9e54e1ad01f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "53116",
                "uid": "22440af0-4356-4a30-adb2-0b58b9cd01ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:51Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "52683",
                "uid": "1dfb6906-9021-4866-955c-b77652d130c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:42Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "2861e149-7735-41dc-bb0a-bace3bd9ab1a",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "52399",
                "uid": "7b0fbbeb-e58a-4200-8745-6819160118a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-kzbb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-kzbb",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "0e2db1ed-6c22-4135-9cd6-26a9427eb75f"
                    }
                ],
                "resourceVersion": "54835",
                "uid": "4f31747f-c756-4c59-a7da-ccbf653a1700"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-kzbb",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "0e2db1ed-6c22-4135-9cd6-26a9427eb75f"
                    }
                ],
                "resourceVersion": "54885",
                "uid": "284db28c-6335-4adf-89cb-1d820e81c6b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-kzbb"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:deployers",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "50560",
                "uid": "5fe089ab-9a50-454a-bfdf-c4c64d077f9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-kzbb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "50505",
                "uid": "83a928f6-cf8b-4d87-9a1d-497d9cc2983b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-kzbb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-kzbb",
                "resourceVersion": "50559",
                "uid": "86084dfb-a407-41c5-b6d0-26d46f989e8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-kzbb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:03Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "53800",
                "uid": "689fa8a6-21ca-43cb-a736-04398b865988"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:07Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "54011",
                "uid": "0060a837-19bc-4e37-92fc-546c8ab8c344"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:18Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "55201",
                "uid": "f2ef508e-475c-4926-87da-b5890a3cd5c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:19Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "51544",
                "uid": "bafd4b55-8249-4ccc-991b-d35b474065b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:55Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "52987",
                "uid": "487f3e0a-82e1-4f33-a402-6856bede701b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:51Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "2f393bbb-c564-44ec-b994-b7e5edb7cb23",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "52746",
                "uid": "4d05b548-2d87-49d4-b666-eec0cf5dad1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-laxo"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:54Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "52923",
                "uid": "860d7e50-5c37-4eaf-bb31-83bde46770a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-test-annotations-yuzepk",
                    "namespace": "build-e2e-laxo"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-laxo",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "87e625e1-d309-49e2-9c1b-82bf22b673cd"
                    }
                ],
                "resourceVersion": "53091",
                "uid": "ccb823fc-fb16-4df3-bf91-df64e78017cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-laxo",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "87e625e1-d309-49e2-9c1b-82bf22b673cd"
                    }
                ],
                "resourceVersion": "54524",
                "uid": "de7b5a6f-3666-4ed5-bcff-4ec9a1b1c742"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-laxo"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:deployers",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "50352",
                "uid": "7edc5d1c-8224-484d-83f6-22a887395a0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-laxo"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "50381",
                "uid": "17b9b4be-93c0-4faf-8f40-53eb5ceee7e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-laxo"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-laxo",
                "resourceVersion": "50346",
                "uid": "5b9a55bd-83cb-4d39-9523-2fd22ab4e6df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-laxo"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "54027",
                "uid": "c6a9c1e8-c433-457e-95c2-e6b6aa4fb55e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:12Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "54428",
                "uid": "881517fe-5518-454a-8936-05338f7f333d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:21Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "55466",
                "uid": "7d3f8a51-2bd5-46a5-bfee-1d2cd885a47f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "51625",
                "uid": "7a1b6ddf-9fb1-4220-a600-60f91bd41b86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:13Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "50957",
                "uid": "e2e42e5c-1a30-4695-bd6b-f805c3e36871"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "9676f4c2-bdd5-4f58-8e7e-abb0e0b3b8d2",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "54680",
                "uid": "7c28f9d9-3038-4efd-a858-b726bc241ba5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-nbyi"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:19Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-nbyi",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "06f62221-3dc3-4b06-9cca-6b7b2327559d"
                    }
                ],
                "resourceVersion": "55297",
                "uid": "7a6803cb-5099-48e2-a17f-fda25555c40a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:19Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-nbyi",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "06f62221-3dc3-4b06-9cca-6b7b2327559d"
                    }
                ],
                "resourceVersion": "55875",
                "uid": "ca3ef0a5-fa25-40e9-ab72-f3d336133f39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-nbyi"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:deployers",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "50724",
                "uid": "c78cde1c-0422-4f95-ba7c-47be951d395a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-nbyi"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "50727",
                "uid": "a3c401d9-4096-446c-9138-30729b7e3048"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-nbyi"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-nbyi",
                "resourceVersion": "50731",
                "uid": "a1e41016-1b10-4644-be94-650feae20cb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-nbyi"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:03Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "53731",
                "uid": "3d5d79f8-7bf0-4cd4-9500-1be8fffb78c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "54582",
                "uid": "42a816a1-d613-4a1c-bc56-53edd21f5dcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "54621",
                "uid": "d3938b8c-8824-4c38-9dfa-04232ba80694"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:54Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "52936",
                "uid": "0fb7b5c7-59fd-4e54-b353-27d9dad352e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:23Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "51814",
                "uid": "5d462f99-9b04-4294-8e45-5d58fbff1219"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:19Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "81748eef-d1f3-4b28-8dfc-b59cfabc90f2",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "51496",
                "uid": "d029e96e-724d-4682-bc93-dbf877f808f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-nllb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:19Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-nllb",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "dc2695b9-6340-49f4-99b2-59033dae0697"
                    }
                ],
                "resourceVersion": "51605",
                "uid": "15d9a34c-5c4d-47bb-b287-afba89187ddd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-nllb",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "dc2695b9-6340-49f4-99b2-59033dae0697"
                    }
                ],
                "resourceVersion": "139892",
                "uid": "286a161c-d385-4425-8014-6ef910ac519a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-nllb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:deployers",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "50231",
                "uid": "23fa1808-56dd-4b34-94d9-1b143e3ad9cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-nllb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "50232",
                "uid": "dd54224f-3091-4ca9-a05c-496d21f1b25e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-nllb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-nllb",
                "resourceVersion": "50230",
                "uid": "a1a376a2-4796-4bcd-bdd5-edf7a2085d79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-nllb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "53291",
                "uid": "2f2bf6a2-2be4-49fe-a02c-857f256bbdfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:07Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "54028",
                "uid": "5ac6dd46-42df-4fa0-8e0b-2d74c6e24f22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:19Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "55381",
                "uid": "6d5ae697-defe-4ead-8cfc-dc0f917b25d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:42Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "52401",
                "uid": "d162d742-fe8c-44e1-8241-0cf90eddd4b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "51666",
                "uid": "479bee88-665b-480a-bd88-dae68099c6a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "2280e564-813d-4288-9a82-61c1bdeec21e",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "53141",
                "uid": "acacd919-9c79-436b-8694-e28eddf69673"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-nlva"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:15Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "62090",
                "uid": "d9f5c356-b9dc-4267-a89d-b6e00084c74f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-fj-multi-component-child-zusr",
                    "namespace": "build-e2e-nlva"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-fj-multi-component-parent-zusr",
                    "namespace": "build-e2e-nlva"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:53Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-nlva",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "e3f4d42f-7596-44c3-87bf-22851490d15e"
                    }
                ],
                "resourceVersion": "52878",
                "uid": "a1a55e1b-48bf-4ebd-b9b7-5d04ba29b50c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:55Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-nlva",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "e3f4d42f-7596-44c3-87bf-22851490d15e"
                    }
                ],
                "resourceVersion": "53006",
                "uid": "200bbb61-9ba9-4c70-9b7e-cd4d1f30236c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-nlva"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:deployers",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "50474",
                "uid": "534d1cb3-36b6-4bc8-b839-5113314e2a65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-nlva"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "50493",
                "uid": "8029df15-c190-43df-a683-afd2ab0a5fdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-nlva"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-nlva",
                "resourceVersion": "50525",
                "uid": "c38adc65-6cb0-47ef-9789-6a114895cd4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-nlva"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:11Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "54405",
                "uid": "5abe205a-a0be-4628-8549-52f72a15dbbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "53213",
                "uid": "fcc74d61-f74a-4eb3-8c67-17724e7bf1b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "54665",
                "uid": "aac0c175-deb6-417a-9715-6572c03cbddd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:23Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "51813",
                "uid": "eefaeaa3-fd1e-4718-a9f8-366586edace1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "53050",
                "uid": "e2564611-9aea-41ca-93cb-30eb8150c269"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:39Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "5a4daf8d-d48b-4b0f-985a-847dfb4315a3",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "52245",
                "uid": "452b6ae0-0b6e-4868-ae56-0b72183d1747"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-sspn"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:02Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-sspn",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "d16a790d-dd4a-44df-becb-8e6d494a2cd1"
                    }
                ],
                "resourceVersion": "53617",
                "uid": "1b60c0f6-e531-4ad0-9299-38c1719e5ad9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:02Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-sspn",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "d16a790d-dd4a-44df-becb-8e6d494a2cd1"
                    }
                ],
                "resourceVersion": "53672",
                "uid": "63e5b484-8c9a-47aa-a39c-3ecbc232c932"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-sspn"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:deployers",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "50527",
                "uid": "dc3f3fee-c06b-43a1-9d9d-4d93d2b46578"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-sspn"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "50492",
                "uid": "8449eb8f-8621-45ee-b973-76db690c9b9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-sspn"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-sspn",
                "resourceVersion": "50506",
                "uid": "30ae09a8-7afb-47e4-8bda-4be7602bed8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-sspn"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "50630",
                "uid": "d9f73e48-57de-411e-ba58-f7d1178d1d98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:02Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "53603",
                "uid": "28e52168-d602-446e-b564-0f0c7e31dc2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "50642",
                "uid": "cff95b2c-2b53-422a-a73f-8d55fce6c644"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "53188",
                "uid": "4c9888b7-a4ef-41f1-bab6-6e682d20b073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "51693",
                "uid": "b2cd9a27-0908-4d91-9de2-be2ee160763c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "af250233-7a52-49e8-b91b-90469f887b51",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "50708",
                "uid": "4edbae7d-cb87-48ee-a3a9-5b02e8238ad5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-wqht"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:53Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "61336",
                "uid": "1bc0092e-19b0-49fc-af18-1ffebfe93ffe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-gh-multi-component-child-qvqr",
                    "namespace": "build-e2e-wqht"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-gh-multi-component-parent-qvqr",
                    "namespace": "build-e2e-wqht"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:22Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-wqht",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "767c544f-14b9-4d46-a9bd-9df868e2dba9"
                    }
                ],
                "resourceVersion": "51784",
                "uid": "9ff74e9e-134c-4a63-a819-0d744e719990"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:25Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-wqht",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "767c544f-14b9-4d46-a9bd-9df868e2dba9"
                    }
                ],
                "resourceVersion": "53153",
                "uid": "859eced7-921a-4d61-9bcf-7c8821fe2dd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-wqht"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:deployers",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "50240",
                "uid": "b4e25334-0a30-4adb-b330-b88409671b08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-wqht"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "50239",
                "uid": "72044e4d-6898-4944-8f47-e57eb0020d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-wqht"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-wqht",
                "resourceVersion": "50249",
                "uid": "cc637d6f-1b1a-44a3-9e38-9c9688ad4d4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-wqht"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:13Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-e2e-yige",
                "resourceVersion": "54525",
                "uid": "7da78b60-255c-46da-be84-4e470f68482f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-e2e-yige",
                "resourceVersion": "53360",
                "uid": "c41bdfc8-6e05-4b21-a0dc-b0918a5c52c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:17Z",
                "name": "dedicated-admins-0",
                "namespace": "build-e2e-yige",
                "resourceVersion": "55003",
                "uid": "269fd8fc-833f-4704-a833-f4a984aab1bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:55Z",
                "name": "dedicated-admins-1",
                "namespace": "build-e2e-yige",
                "resourceVersion": "53005",
                "uid": "ac2b17e1-e4a6-4c84-9905-c083b81288c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-e2e-yige",
                "resourceVersion": "53077",
                "uid": "ade36807-5c77-4577-aeff-8e6017e2507e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "61b29ca8-9ba2-4471-b275-4846949b9d1e",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-e2e-yige",
                "resourceVersion": "53799",
                "uid": "7a6dda6c-721f-4f2b-808b-460297db2bcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-e2e-yige"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:18Z",
                "name": "kubearchive-sink",
                "namespace": "build-e2e-yige",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "ce7e3e85-ba0d-4532-ab8a-e33cb600717e"
                    }
                ],
                "resourceVersion": "55211",
                "uid": "7a93ec1d-769d-4dab-8999-0bea3ca8a89c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:18Z",
                "name": "kubearchive-vacuum",
                "namespace": "build-e2e-yige",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "ce7e3e85-ba0d-4532-ab8a-e33cb600717e"
                    }
                ],
                "resourceVersion": "159557",
                "uid": "e0c20343-401e-404d-8599-254e2834f8c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-yige"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:deployers",
                "namespace": "build-e2e-yige",
                "resourceVersion": "50732",
                "uid": "1b06093b-3ff5-42c0-a737-1981370c706b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-e2e-yige"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-builders",
                "namespace": "build-e2e-yige",
                "resourceVersion": "50730",
                "uid": "817ca3f9-5a7a-4793-affa-4caddc0c7fdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-e2e-yige"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-pullers",
                "namespace": "build-e2e-yige",
                "resourceVersion": "50733",
                "uid": "dc59ddcb-db95-4935-9228-8aa6a495b680"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-e2e-yige"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/build-admins",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/build-admins\"},\"name\":\"build-admins\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build-admins\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "build-admins",
                "namespace": "build-service",
                "resourceVersion": "23703",
                "uid": "425644e2-8b5d-427e-9b37-8f2b760f5268"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/build-pipeline-config-read-only-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/build-pipeline-config-read-only-binding\"},\"name\":\"build-pipeline-config-read-only-binding\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-service-build-pipeline-config-read-only\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "build-pipeline-config-read-only-binding",
                "namespace": "build-service",
                "resourceVersion": "23700",
                "uid": "1f9aa101-57bd-43e5-a507-5bc5f149529a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-build-pipeline-config-read-only"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/build-service-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/build-service-leader-election-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"build-service\"},\"name\":\"build-service-leader-election-rolebinding\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service"
                },
                "name": "build-service-leader-election-rolebinding",
                "namespace": "build-service",
                "resourceVersion": "23768",
                "uid": "5f81d5c4-94e7-425e-bc1d-a0aee7303cb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:40Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-service",
                "resourceVersion": "23051",
                "uid": "41300bd4-1100-4e94-ac01-6625b1020370"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-service",
                "resourceVersion": "23696",
                "uid": "b5d34e2b-0b31-4a22-8bbc-02037122e580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "build-service",
                "resourceVersion": "23233",
                "uid": "ea149ac5-de33-4e57-b28b-296ab51f4a73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-1",
                "namespace": "build-service",
                "resourceVersion": "23252",
                "uid": "9f16d128-42b3-497c-988f-f2024db3068b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-service",
                "resourceVersion": "23913",
                "uid": "aa180c62-98eb-4bf1-8853-8d69dc4aba12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "grant-argocd",
                "namespace": "build-service",
                "resourceVersion": "23760",
                "uid": "4aa44055-6ef4-4203-a209-5edf8c6f0e65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "system:deployers",
                "namespace": "build-service",
                "resourceVersion": "22656",
                "uid": "7b9000ca-57d5-4dd1-8152-b13dda147782"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "system:image-builders",
                "namespace": "build-service",
                "resourceVersion": "22657",
                "uid": "d5e72cf4-5db9-4716-b12e-a66c433dee78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "system:image-pullers",
                "namespace": "build-service",
                "resourceVersion": "22658",
                "uid": "5791ae69-988d-4399-93c5-1171d0b779c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/view-konflux-integration-runner",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-service/view-konflux-integration-runner\"},\"name\":\"view-konflux-integration-runner\",\"namespace\":\"build-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"view\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "view-konflux-integration-runner",
                "namespace": "build-service",
                "resourceVersion": "23764",
                "uid": "d0c721db-a4dd-4945-90d6-e79737d4b3be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/admin-buildpipelineselectors-from-ci-namespaces",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/admin-buildpipelineselectors-from-ci-namespaces\"},\"name\":\"admin-buildpipelineselectors-from-ci-namespaces\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"admin-buildpipelineselectors\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-ci-sa\",\"namespace\":\"konflux-ci\"},{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "admin-buildpipelineselectors-from-ci-namespaces",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21317",
                "uid": "6f44f05c-f39b-49bd-ac32-ea44d3a5037e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "admin-buildpipelineselectors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-ci-sa",
                    "namespace": "konflux-ci"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/build-admins",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/build-admins\"},\"name\":\"build-admins\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"build-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build-admins\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "build-admins",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21322",
                "uid": "6696649e-d3c5-4d3c-a4b4-c771cdec2f68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "build-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-templates-e2e",
                "resourceVersion": "23091",
                "uid": "d98b13da-9414-43ac-9688-51880a59d28a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-templates-e2e",
                "resourceVersion": "23385",
                "uid": "beaae2c1-ed4d-4ff8-83b3-2ba78f903830"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-0",
                "namespace": "build-templates-e2e",
                "resourceVersion": "23260",
                "uid": "a07fe3dc-c9ae-415a-a7cc-f7f1bb1be686"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-1",
                "namespace": "build-templates-e2e",
                "resourceVersion": "23357",
                "uid": "2e8a8f72-9b33-4fe8-8328-269a5e1e4856"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-templates-e2e",
                "resourceVersion": "23440",
                "uid": "dc7500e0-734f-460f-962f-dbe62598addf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/edit-pipeline-from-build-templates",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/edit-pipeline-from-build-templates\"},\"name\":\"edit-pipeline-from-build-templates\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"edit\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-ci-sa\",\"namespace\":\"konflux-ci\"},{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "edit-pipeline-from-build-templates",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21330",
                "uid": "794ce306-f412-4ad9-8018-3300e717c21c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-ci-sa",
                    "namespace": "konflux-ci"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/edit-pipeline-from-build-templates-namespace",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/edit-pipeline-from-build-templates-namespace\"},\"name\":\"edit-pipeline-from-build-templates-namespace\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"edit-namespace\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-ci-sa\",\"namespace\":\"konflux-ci\"},{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "edit-pipeline-from-build-templates-namespace",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21319",
                "uid": "7c65cdbe-f57b-4fa2-97dd-689cd9556d3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "edit-namespace"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-ci-sa",
                    "namespace": "konflux-ci"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/integration-runner-resources-konflux-integration-runner",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/integration-runner-resources-konflux-integration-runner\"},\"name\":\"integration-runner-resources-konflux-integration-runner\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"integration-runner-resources\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "integration-runner-resources-konflux-integration-runner",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21329",
                "uid": "91ecb9b2-9f2f-4ac7-a936-22730620b09f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "integration-runner-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/konflux-integration-runner-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/konflux-integration-runner-rolebinding\"},\"name\":\"konflux-integration-runner-rolebinding\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"konflux-integration-runner\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"rhtap-build-tenant\"},{\"kind\":\"ServiceAccount\",\"name\":\"konflux-integration-runner\",\"namespace\":\"build-templates-e2e\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21343",
                "uid": "e98fa60f-7f0a-408e-bb1c-85f4719ff20c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rhtap-build-tenant"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "build-templates-e2e"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "name": "system:deployers",
                "namespace": "build-templates-e2e",
                "resourceVersion": "20366",
                "uid": "7c0fae36-bc58-40fd-81da-832bddd7cc0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-templates-e2e"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "name": "system:image-builders",
                "namespace": "build-templates-e2e",
                "resourceVersion": "20368",
                "uid": "6f3ecc50-a1d4-40fc-aa3a-79d90f410bcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-templates-e2e"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "name": "system:image-pullers",
                "namespace": "build-templates-e2e",
                "resourceVersion": "20363",
                "uid": "0c8bb161-9ad5-48df-9b13-7ea377f95efe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-templates-e2e"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/test-runner-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"build-templates-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:build-templates-e2e/test-runner-rolebinding\"},\"name\":\"test-runner-rolebinding\",\"namespace\":\"build-templates-e2e\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"test-runner\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-ci-sa\",\"namespace\":\"konflux-ci\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:22Z",
                "name": "test-runner-rolebinding",
                "namespace": "build-templates-e2e",
                "resourceVersion": "21347",
                "uid": "3932e599-2ffd-4624-9ee7-85e76b6a3afb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "test-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-ci-sa",
                    "namespace": "konflux-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "build-templates",
                "resourceVersion": "22874",
                "uid": "e5d52c8a-d9c8-4e5d-acbb-1bc0f9743bf7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "build-templates",
                "resourceVersion": "23774",
                "uid": "15d9f7a8-30f7-45e2-a015-6871573e730b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-0",
                "namespace": "build-templates",
                "resourceVersion": "23290",
                "uid": "0b1edaff-f1c4-4e82-9266-52c5cae32d6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admins-1",
                "namespace": "build-templates",
                "resourceVersion": "23389",
                "uid": "abdd3d08-9feb-4e46-8a83-242fcedeb976"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "build-templates",
                "resourceVersion": "23426",
                "uid": "15b002ed-d9d6-4cf2-88c9-519ae094925e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-application-controller",
                "namespace": "build-templates",
                "resourceVersion": "20359",
                "uid": "f32ffd3d-1618-46f0-b755-5b5179738134"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-server",
                "namespace": "build-templates",
                "resourceVersion": "20362",
                "uid": "c2061782-bea7-43e3-963b-2037f511d8ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "name": "system:deployers",
                "namespace": "build-templates",
                "resourceVersion": "20367",
                "uid": "a9cb2ba8-46bd-47ae-b228-cb78702d2f2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "build-templates"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "name": "system:image-builders",
                "namespace": "build-templates",
                "resourceVersion": "20364",
                "uid": "9e9b30a4-7bfc-44ba-aaae-8567fffc1dfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "build-templates"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:13Z",
                "name": "system:image-pullers",
                "namespace": "build-templates",
                "resourceVersion": "20360",
                "uid": "fd150947-1197-4e91-85e7-e8802fdd002e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:build-templates"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:29Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "caching",
                "resourceVersion": "27154",
                "uid": "10fe57d0-67ae-491d-9224-f9716e5f3b6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "caching",
                "resourceVersion": "27319",
                "uid": "a81bc7fd-bf16-4309-85f5-6c6215b994d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admins-0",
                "namespace": "caching",
                "resourceVersion": "27275",
                "uid": "63ef8cfc-9586-45c0-8a8e-dd9409bdc47d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:25Z",
                "name": "dedicated-admins-1",
                "namespace": "caching",
                "resourceVersion": "26631",
                "uid": "2cea48e3-0e2e-4c07-b40d-d3d67cefc5bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "caching",
                "resourceVersion": "27361",
                "uid": "7683d756-baf8-4303-a1bc-c65307a8252a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "squid-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:caching/konflux-vanguard-admins",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"squid-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:caching/konflux-vanguard-admins\"},\"name\":\"konflux-vanguard-admins\",\"namespace\":\"caching\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-vanguard\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "konflux-vanguard-admins",
                "namespace": "caching",
                "resourceVersion": "25375",
                "uid": "cf4a2602-5f34-411e-848b-2e466b578735"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-vanguard"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:05Z",
                "name": "system:deployers",
                "namespace": "caching",
                "resourceVersion": "25200",
                "uid": "73461d50-f39e-426d-9383-b1360a80a17d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "caching"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:05Z",
                "name": "system:image-builders",
                "namespace": "caching",
                "resourceVersion": "25201",
                "uid": "423f63e6-a9db-44b4-9fe2-815025e7ef48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "caching"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:05Z",
                "name": "system:image-pullers",
                "namespace": "caching",
                "resourceVersion": "25199",
                "uid": "356cff0f-65ce-4def-b01d-9b742ae13e4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:caching"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:53Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "cert-manager-operator.v1.19.0",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "cert-manager-operator",
                    "olm.permissions.hash": "5BvcE6aNRl1kjQ4qoZiC75uAhCACnLI6hzXqiT",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1-8avl0jYCNWpNVU2Mr9j8EIfRaMGFwRbvqpaG77",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "cert-manager-operator.v1.19.0",
                        "uid": "ee767630-65ba-45a4-b081-a07ebf2343fc"
                    }
                ],
                "resourceVersion": "25032",
                "uid": "1e65844e-4201-4a0d-a0e7-783201b55fa4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-operator.v1-8avl0jYCNWpNVU2Mr9j8EIfRaMGFwRbvqpaG77"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:50Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "cert-manager-operator.v1.19.0",
                "namespace": "cert-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "cert-manager-operator.v1.19.0",
                        "uid": "ea7bc760-33bd-4e39-b3d9-033aec9fd2a5"
                    }
                ],
                "resourceVersion": "24050",
                "uid": "b4b8cebd-1be3-4a94-943a-2e511de6eb8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-operator.v1.19.0"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19412",
                "uid": "2fd5bd1d-2278-4724-bf4d-336e95f24b40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19424",
                "uid": "38a3a045-4608-41aa-9d09-2a3dd81bcd29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "dedicated-admins-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19423",
                "uid": "06be003f-748d-416b-be96-569ad151641c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "dedicated-admins-1",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19392",
                "uid": "2b67ead8-1a62-42b7-8471-ce87a214250d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19460",
                "uid": "b0ddcb7f-6c1f-4839-837f-11288183eb9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "system:deployers",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19420",
                "uid": "a6d5b664-32d7-4468-a2e0-779b61899126"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "system:image-builders",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19408",
                "uid": "e9ba25da-0ec9-4b2e-951b-ec7a5afad414"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:04Z",
                "name": "system:image-pullers",
                "namespace": "cert-manager-operator",
                "resourceVersion": "19409",
                "uid": "c7820fdb-533e-445b-b8c1-3f864b923e30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:19Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-tokenrequest",
                "namespace": "cert-manager",
                "resourceVersion": "26343",
                "uid": "cc138705-c111-47f9-ae6e-e9660ce61813"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-tokenrequest"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:03Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-webhook:dynamic-serving",
                "namespace": "cert-manager",
                "resourceVersion": "25075",
                "uid": "21095adc-f9fc-4255-a0ba-9b313e3f9b07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-webhook:dynamic-serving"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:27Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "cert-manager",
                "resourceVersion": "26887",
                "uid": "811b4f79-c179-49b5-8968-0bfd6d0496cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "cert-manager",
                "resourceVersion": "27372",
                "uid": "41e6f2d2-9944-4732-bdf2-adb739b565af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admins-0",
                "namespace": "cert-manager",
                "resourceVersion": "27283",
                "uid": "c405679f-9125-43c0-add2-f88671b9c8ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "dedicated-admins-1",
                "namespace": "cert-manager",
                "resourceVersion": "26499",
                "uid": "75541b31-17c7-4076-a86b-9f24f914d333"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "cert-manager",
                "resourceVersion": "27406",
                "uid": "5ef3b73e-71cc-4750-a307-05ccc35ea0e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:57Z",
                "name": "system:deployers",
                "namespace": "cert-manager",
                "resourceVersion": "24505",
                "uid": "7a3e40a7-4b65-49a0-aad6-575e2b59013c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:57Z",
                "name": "system:image-builders",
                "namespace": "cert-manager",
                "resourceVersion": "24515",
                "uid": "4f1bad39-e505-409e-a7b2-4a6d30a5069d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:57Z",
                "name": "system:image-pullers",
                "namespace": "cert-manager",
                "resourceVersion": "24506",
                "uid": "4ac68586-13f4-49ca-8c3a-6973ba31e769"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "trust-manager-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:cert-manager/trust-manager",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"trust-manager-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:cert-manager/trust-manager\"},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.19.0\",\"helm.sh/chart\":\"trust-manager-v0.19.0\"},\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"trust-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.19.0",
                    "helm.sh/chart": "trust-manager-v0.19.0"
                },
                "name": "trust-manager",
                "namespace": "cert-manager",
                "resourceVersion": "27848",
                "uid": "16f80182-4a2a-42ab-a3a0-d0dac757a7a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trust-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "trust-manager-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:cert-manager/trust-manager:leaderelection",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"trust-manager-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:cert-manager/trust-manager:leaderelection\"},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.19.0\",\"helm.sh/chart\":\"trust-manager-v0.19.0\"},\"name\":\"trust-manager:leaderelection\",\"namespace\":\"cert-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"trust-manager:leaderelection\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.19.0",
                    "helm.sh/chart": "trust-manager-v0.19.0"
                },
                "name": "trust-manager:leaderelection",
                "namespace": "cert-manager",
                "resourceVersion": "27849",
                "uid": "6bc1ce2f-7a3b-460b-a872-1459afd07b25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trust-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:08Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "54154",
                "uid": "26714c9e-54e2-4ed3-916e-7413a7c9fcdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:02Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "53677",
                "uid": "fe18a2e0-e153-48bd-bfbc-1bc808f427b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:15Z",
                "name": "dedicated-admins-0",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "54757",
                "uid": "8b8d06f7-0510-4004-bfc0-4fd0dd0d91cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:29Z",
                "name": "dedicated-admins-1",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "52058",
                "uid": "1523cc2d-6e4d-4a11-bf23-d189bee18477"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "51631",
                "uid": "e8544832-2851-4cb2-8f28-f4aee56abe15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "c0e5d00a-17bc-4bdb-a82d-46a787e265e9",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "54695",
                "uid": "ce57381a-a749-4358-a54c-96498aaf7a0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "chains-e2e-lydf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:04Z",
                "name": "kubearchive-sink",
                "namespace": "chains-e2e-lydf",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "e5f5e73f-1237-4344-b606-080ae22404e0"
                    }
                ],
                "resourceVersion": "53939",
                "uid": "75d0f91f-cdb1-45b0-bd55-c784b6bb978f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:07Z",
                "name": "kubearchive-vacuum",
                "namespace": "chains-e2e-lydf",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "e5f5e73f-1237-4344-b606-080ae22404e0"
                    }
                ],
                "resourceVersion": "53995",
                "uid": "d2333101-716a-4018-a80d-d9f4f02c3d3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "chains-e2e-lydf"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:deployers",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "50703",
                "uid": "80afcd70-41b7-4da1-81d8-bcb930265772"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "chains-e2e-lydf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-builders",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "50698",
                "uid": "10c3e1b2-096b-4f53-b292-9adeed30353f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "chains-e2e-lydf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-pullers",
                "namespace": "chains-e2e-lydf",
                "resourceVersion": "50704",
                "uid": "48224973-5030-405c-adc5-97350c6b0da0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:chains-e2e-lydf"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "ci-helper-app",
                "resourceVersion": "18904",
                "uid": "684cac95-b50a-4b20-809a-d3bc290f1808"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "ci-helper-app",
                "resourceVersion": "18907",
                "uid": "6136d8a1-d221-4897-a7de-0fbb235a9056"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:41Z",
                "name": "dedicated-admins-0",
                "namespace": "ci-helper-app",
                "resourceVersion": "18901",
                "uid": "749fb64f-f6c6-4ffc-8650-c7eeb873ab96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admins-1",
                "namespace": "ci-helper-app",
                "resourceVersion": "18905",
                "uid": "32ae4199-b104-459d-9304-c08508775fb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "ci-helper-app",
                "resourceVersion": "18910",
                "uid": "476d245a-7337-4f43-ace3-de77c8ae4c82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:37Z",
                "name": "system:deployers",
                "namespace": "ci-helper-app",
                "resourceVersion": "18851",
                "uid": "c49480cb-fd6b-4189-9095-177ba50a6f3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "ci-helper-app"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:37Z",
                "name": "system:image-builders",
                "namespace": "ci-helper-app",
                "resourceVersion": "18849",
                "uid": "9364ca75-bbb3-401a-af86-c100e9a71dad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "ci-helper-app"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:37Z",
                "name": "system:image-pullers",
                "namespace": "ci-helper-app",
                "resourceVersion": "18848",
                "uid": "8c569d18-64bc-48f7-be9b-0510f32f9204"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:ci-helper-app"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "crossplane-connections",
                "resourceVersion": "27247",
                "uid": "c85fefd9-2f48-4df8-b4d4-889198dc3972"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:34Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "crossplane-connections",
                "resourceVersion": "27428",
                "uid": "acf893d8-6ee3-4cb7-a257-296e8c63887b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "dedicated-admins-0",
                "namespace": "crossplane-connections",
                "resourceVersion": "27253",
                "uid": "2ba3cfc5-fe2f-4b52-9a39-258114793fb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:25Z",
                "name": "dedicated-admins-1",
                "namespace": "crossplane-connections",
                "resourceVersion": "26578",
                "uid": "e2b2ae7a-c939-4177-b8f7-ae85f2e918dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:35Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "crossplane-connections",
                "resourceVersion": "27447",
                "uid": "c9451f59-5e0d-43c7-9b89-4b528c3b51d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "system:deployers",
                "namespace": "crossplane-connections",
                "resourceVersion": "26121",
                "uid": "ef1c8958-839d-4bcf-aca2-2dc7ca65d4c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "crossplane-connections"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "system:image-builders",
                "namespace": "crossplane-connections",
                "resourceVersion": "26113",
                "uid": "f5d432eb-6e86-4691-a89e-201fb9ee5569"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "crossplane-connections"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "system:image-pullers",
                "namespace": "crossplane-connections",
                "resourceVersion": "26112",
                "uid": "3c3b0de0-820a-4acf-a006-2a702f92f2da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:crossplane-connections"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "crossplane-system",
                "resourceVersion": "23081",
                "uid": "430ffd44-2847-4bf2-a1c2-1f5e4a72ccca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "crossplane-system",
                "resourceVersion": "23392",
                "uid": "d0f5fd1f-9d04-4a73-a4f0-91b9b3c6851b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-0",
                "namespace": "crossplane-system",
                "resourceVersion": "23352",
                "uid": "972799d2-b277-491b-a2bc-7fc2e0a6a31b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admins-1",
                "namespace": "crossplane-system",
                "resourceVersion": "23367",
                "uid": "ed977b65-701c-4902-8467-231018f88dcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "crossplane-system",
                "resourceVersion": "23648",
                "uid": "f17b8dcd-f7d9-4c8b-b9d3-16c0ed46d5e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:07Z",
                "name": "system:deployers",
                "namespace": "crossplane-system",
                "resourceVersion": "19751",
                "uid": "631c6e1e-33f9-4e7a-ba75-c0c0654fc3eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:07Z",
                "name": "system:image-builders",
                "namespace": "crossplane-system",
                "resourceVersion": "19752",
                "uid": "178d59d6-ca48-44bc-9343-31ccd0056004"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:07Z",
                "name": "system:image-pullers",
                "namespace": "crossplane-system",
                "resourceVersion": "19746",
                "uid": "878f54e3-a64a-4aec-b459-7da4677c6762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "5201",
                "uid": "d1ee6a0f-72bd-4bce-9d80-bdbc846f01db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "5204",
                "uid": "27d3c88f-0a23-45af-af61-47b37c278548"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "dedicated-admins-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "5211",
                "uid": "eb67dd9f-5d9d-452c-b735-8f5d8c351b82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "dedicated-admins-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "5220",
                "uid": "2cb184d8-27f0-44f2-83bc-576d2443f698"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6585",
                "uid": "ebadcb25-9200-4eb4-8b5d-417e62e7c90d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:deployers",
                "namespace": "dedicated-admin",
                "resourceVersion": "5086",
                "uid": "26186a79-b6e2-4056-80d4-721c5f9e10d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-builders",
                "namespace": "dedicated-admin",
                "resourceVersion": "5109",
                "uid": "c15d53ff-a4fc-4f0b-a77e-433e8a35c7ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-pullers",
                "namespace": "dedicated-admin",
                "resourceVersion": "5105",
                "uid": "7ac5bfd5-19b9-4b25-ae33-fb36e17024a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "default",
                "resourceVersion": "6446",
                "uid": "589facff-487c-4f44-975a-d18319e58341"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-cee-0",
                "namespace": "default",
                "resourceVersion": "6781",
                "uid": "0f91c1e2-900c-4ab0-a3bf-3471e674105e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "default",
                "resourceVersion": "5363",
                "uid": "bb5a0e1e-f75e-4af7-8374-232d8ec842da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "default",
                "resourceVersion": "6458",
                "uid": "c83f6b21-3c62-4b65-936f-76006c52594b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "default",
                "resourceVersion": "6003",
                "uid": "8ab44c8a-af92-4907-89da-9eff3af22211"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "default",
                "resourceVersion": "5907",
                "uid": "8926749e-450b-42f4-9a81-c0f024d7329a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "default",
                "resourceVersion": "6616",
                "uid": "98b5ec8f-5f2b-447f-9725-c58d5db71dc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "default",
                "resourceVersion": "5880",
                "uid": "0b1a5c8c-1b01-42b1-ab70-e02ddcc24b67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "default",
                "resourceVersion": "5441",
                "uid": "53aa370e-4c77-41ff-b130-f200329f26d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-1",
                "namespace": "default",
                "resourceVersion": "5458",
                "uid": "51b761bd-553a-4f80-85d5-f1156d43f35b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "default",
                "resourceVersion": "6133",
                "uid": "6817789d-749e-4bf2-8c2c-c804993f0d27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "default",
                "resourceVersion": "6143",
                "uid": "1e277e29-fde9-49dc-b964-2b90d2ab70f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "default",
                "resourceVersion": "5223",
                "uid": "115a928f-0abf-4aef-bc89-d5c68213b7e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:23Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "namespace": "default",
                "resourceVersion": "11934",
                "uid": "62f5aee1-126d-442e-8746-3df10df558ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "default",
                "resourceVersion": "2382",
                "uid": "094da90e-2984-4919-8084-bf706afa03dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "default",
                "resourceVersion": "2384",
                "uid": "b01da037-0c89-4be4-a07c-d5b12f7aa38d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:33Z",
                "name": "system:image-pullers",
                "namespace": "default",
                "resourceVersion": "2280",
                "uid": "7823c964-8fca-47c1-b2d3-d235766165d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dora-metrics",
                "resourceVersion": "19038",
                "uid": "6cc995fc-3bbd-4dbc-85b8-99a0ddb9e63c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dora-metrics",
                "resourceVersion": "19036",
                "uid": "1402c897-caa6-496d-870a-de3bdd3e5646"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admins-0",
                "namespace": "dora-metrics",
                "resourceVersion": "19033",
                "uid": "b2bfcf26-321b-4f8e-b9a9-52013c1b8509"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:49Z",
                "name": "dedicated-admins-1",
                "namespace": "dora-metrics",
                "resourceVersion": "19047",
                "uid": "b7816535-8b37-449d-ac9f-e3cd721171e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dora-metrics",
                "resourceVersion": "19045",
                "uid": "4d60fa9b-9925-4977-aef2-8e9c19eb958a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "dora-metrics-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:dora-metrics/dora-metrics-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"dora-metrics-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:dora-metrics/dora-metrics-maintainers\"},\"name\":\"dora-metrics-maintainers\",\"namespace\":\"dora-metrics\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"dora-metrics-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-qe-admins\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "dora-metrics-maintainers",
                "namespace": "dora-metrics",
                "resourceVersion": "19939",
                "uid": "0463fadc-bed1-430c-b947-4925edb74556"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dora-metrics-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-qe-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:46Z",
                "name": "system:deployers",
                "namespace": "dora-metrics",
                "resourceVersion": "19024",
                "uid": "020fdbfa-aac2-43d9-ab1a-e0ac41cf5a86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:46Z",
                "name": "system:image-builders",
                "namespace": "dora-metrics",
                "resourceVersion": "19025",
                "uid": "7010f24d-0ef8-4cc8-b086-9be5032b51a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:46Z",
                "name": "system:image-pullers",
                "namespace": "dora-metrics",
                "resourceVersion": "19023",
                "uid": "ea43117b-385d-4b51-9111-12894aee3688"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dr-bc",
                "resourceVersion": "174622",
                "uid": "5c729f13-7a8c-45e4-9d67-b0e1e5c63143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:51Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dr-bc",
                "resourceVersion": "174883",
                "uid": "568f217b-56a9-4790-bf74-31a0993c4e53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:53Z",
                "name": "dedicated-admins-0",
                "namespace": "dr-bc",
                "resourceVersion": "174906",
                "uid": "cd182481-2ea4-4e64-9293-4d00935767ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:45Z",
                "name": "dedicated-admins-1",
                "namespace": "dr-bc",
                "resourceVersion": "174755",
                "uid": "9bf85c69-5fc0-412c-8087-f88b3066ebef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dr-bc",
                "resourceVersion": "174830",
                "uid": "262eeb48-505d-460d-8952-cf7cc1b37b43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "5abd5817-c369-4dbf-82a8-0ef6fae3114b",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "dr-bc",
                "resourceVersion": "174713",
                "uid": "a7f2abed-afde-4204-957c-25eb1d08d9fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "dr-bc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "name": "kubearchive-sink",
                "namespace": "dr-bc",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "0e50ff5e-bb05-4a2c-a28e-edab3fa52b8a"
                    }
                ],
                "resourceVersion": "174681",
                "uid": "5e5bb2d7-e183-43ed-8fb6-121b27667947"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "name": "kubearchive-vacuum",
                "namespace": "dr-bc",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "0e50ff5e-bb05-4a2c-a28e-edab3fa52b8a"
                    }
                ],
                "resourceVersion": "174703",
                "uid": "3b557fbf-f9a7-46ae-a936-dc4b261238ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-bc"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "name": "system:deployers",
                "namespace": "dr-bc",
                "resourceVersion": "174643",
                "uid": "c9c4c8fa-abd3-43de-8ba6-05e16df9da74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dr-bc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "name": "system:image-builders",
                "namespace": "dr-bc",
                "resourceVersion": "174619",
                "uid": "8ddcc604-5967-41b3-92ef-545a774b33a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dr-bc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:57:44Z",
                "name": "system:image-pullers",
                "namespace": "dr-bc",
                "resourceVersion": "174620",
                "uid": "d93ebf44-91e7-4383-aa35-49399007a7c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dr-bc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176137",
                "uid": "55b054b9-1d6b-4b02-b30c-9d72bbe032c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:15Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176128",
                "uid": "f59407f4-90f1-4cd0-833a-397adb9f1f71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:21Z",
                "name": "dedicated-admins-0",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176244",
                "uid": "99209901-ed06-4a0f-be25-12d1d34e8ff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:17Z",
                "name": "dedicated-admins-1",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176150",
                "uid": "05c0c696-26e8-4165-89f1-c71f6c1d9e82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:19Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176206",
                "uid": "078d1d99-8832-4d9a-bc4f-3c7d69588229"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:13Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "d583d439-d6ca-40aa-af66-4ae2d6a98a04",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176029",
                "uid": "7a3fe541-fcf8-44c1-b3ee-e0e4fa3d78dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "kubearchive-sink",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "affe4f46-09f9-4922-bd59-51fa8533dc87"
                    }
                ],
                "resourceVersion": "175968",
                "uid": "a0d7d618-0d4e-4577-9c76-957d2dae51ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "kubearchive-vacuum",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "affe4f46-09f9-4922-bd59-51fa8533dc87"
                    }
                ],
                "resourceVersion": "175992",
                "uid": "610f00d8-91c4-4318-8ec0-7a542bb4c6eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:13Z",
                "generateName": "release-service-pipeline-rolebinding-",
                "name": "release-service-pipeline-rolebinding-9lnj5",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176092",
                "uid": "371d3c62-966e-4c3e-ac8e-796359bcdae1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-account",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:13Z",
                "name": "role-release-service-account-binding",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "176108",
                "uid": "406ca5a1-b05b-4c00-b47b-7df212232bb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "role-release-service-account"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-account",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "system:deployers",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "175605",
                "uid": "37be040e-663c-40ea-88e8-7d6490d7534d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "system:image-builders",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "175606",
                "uid": "a3109e25-adf1-4c8d-83ef-81273a1116e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "system:image-pullers",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed",
                "resourceVersion": "175587",
                "uid": "c5e4f24f-0bd7-4c15-9dfb-1eadb56184b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dr-test-kokohazamar-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175888",
                "uid": "f4f49580-87de-4d64-a50e-95850de6302f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:14Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "176115",
                "uid": "bd0999de-9339-4219-b3d8-ad0aa35c32eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "dedicated-admins-0",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175594",
                "uid": "b9a987b9-35f7-4680-9239-0d16d3f3c909"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "dedicated-admins-1",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175627",
                "uid": "b8201045-02f6-48eb-abf2-bd569c6b483e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "176138",
                "uid": "5f50cdd8-be8c-41af-ad2b-6a35023545c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:11Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "af24bf7a-af44-4265-8e37-cc1b3d7cf3c2",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175700",
                "uid": "433e168e-cfe7-49b0-bcac-6f3d9a7ddc9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "176071",
                "uid": "e55a18a5-01ae-4966-b200-60a79ce32405"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-mathwizz-web-server",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-mathwizz-history-worker",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-mathwizz-frontend",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:08Z",
                "name": "kubearchive-sink",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "41f7f0f6-4819-419d-903e-4f38f40ed341"
                    }
                ],
                "resourceVersion": "175342",
                "uid": "21b5fb32-1385-444e-917a-be3f0a8c688d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:08Z",
                "name": "kubearchive-vacuum",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "41f7f0f6-4819-419d-903e-4f38f40ed341"
                    }
                ],
                "resourceVersion": "175442",
                "uid": "09e71eae-b3b8-4a0c-88f3-d6bee0d90d6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "system:deployers",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175210",
                "uid": "ed796446-61c7-416e-9c8b-a9f11899da50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "system:image-builders",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175184",
                "uid": "ba914ae8-e7df-4c95-bb85-479e93cbed65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "system:image-pullers",
                "namespace": "dr-test-kokohazamar-backwards-compat-dr",
                "resourceVersion": "175183",
                "uid": "abb7dcc2-6fd7-4961-bf8a-6359e1354c0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dr-test-kokohazamar-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:11Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175815",
                "uid": "53e22cf8-a3a4-4eaf-9d70-d7aaf52d6720"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:15Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "176122",
                "uid": "2371eb95-d761-471e-a7db-27a7c7cfa425"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:23Z",
                "name": "dedicated-admins-0",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "176251",
                "uid": "47695fb3-7847-40ac-a115-220a98074ed8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:21Z",
                "name": "dedicated-admins-1",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "176228",
                "uid": "cca12d07-6d4b-4594-8d1a-ee422181bd58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "176141",
                "uid": "a7213989-86ff-4ede-993c-cd80b9412161"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "5b9ad854-f833-46c3-9ceb-d6af51e383c0",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175867",
                "uid": "30bef3ea-5193-4ec7-8a9d-72e49d3d0055"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:11Z",
                "name": "kubearchive-sink",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "8c8f1dcf-10da-429a-988e-42a7323fc67e"
                    }
                ],
                "resourceVersion": "175816",
                "uid": "85d90d63-c848-4396-8f7a-6515900030b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "kubearchive-vacuum",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "8c8f1dcf-10da-429a-988e-42a7323fc67e"
                    }
                ],
                "resourceVersion": "175833",
                "uid": "1337cdf8-4a1c-4456-b239-8f84be86adf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "generateName": "release-service-pipeline-rolebinding-",
                "name": "release-service-pipeline-rolebinding-hnpzq",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175885",
                "uid": "3da5fbac-8c4d-47b0-8cf6-7b5569844ec1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-pipeline-resource-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-account",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "role-release-service-account-binding",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175959",
                "uid": "3d01fbc1-7536-4837-8c6f-64c334614a68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "role-release-service-account"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-account",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:08Z",
                "name": "system:deployers",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175357",
                "uid": "0bde5ace-f794-4b37-9b7c-bfcc0f1d1093"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:08Z",
                "name": "system:image-builders",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175331",
                "uid": "66e4dcd7-21c8-47b5-9671-8c9877ca4e43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:08Z",
                "name": "system:image-pullers",
                "namespace": "dr-test-moshekipod-backwards-compat-dr-managed",
                "resourceVersion": "175330",
                "uid": "1e931d13-ec23-4caa-9787-693ddc366490"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dr-test-moshekipod-backwards-compat-dr-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:12Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175920",
                "uid": "80edfa8c-dc7c-45c8-9ca0-7917dd15d800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:11Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175787",
                "uid": "c0e8807b-7870-446d-8f70-641333c83be8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "dedicated-admins-0",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175222",
                "uid": "382c9445-ca24-4664-9665-7b38212427a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:09Z",
                "name": "dedicated-admins-1",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175468",
                "uid": "4b957718-b30a-4291-8d29-301563efcde7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "176139",
                "uid": "8ca5cfe7-6dbe-4c69-9a14-dca78d63ecc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:09Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "b269ff6b-52b0-4d1c-a466-3db6ba7fbb2c",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175506",
                "uid": "67e7c0f3-29d1-4aec-a9c2-b7d8aa5bd7ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175850",
                "uid": "4ec8190b-cc41-4182-b914-40a02707fc2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-mathwizz-web-server",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-mathwizz-history-worker",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-mathwizz-frontend",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "kubearchive-sink",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "6f137565-8a98-4f8f-aadd-9c9d8adae086"
                    }
                ],
                "resourceVersion": "175521",
                "uid": "f7c2b742-dcd5-4363-ab93-d3667593a9fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:58:10Z",
                "name": "kubearchive-vacuum",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "6f137565-8a98-4f8f-aadd-9c9d8adae086"
                    }
                ],
                "resourceVersion": "175593",
                "uid": "c1dd9c9c-271f-4ea1-8a1f-20020738d232"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "system:deployers",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175214",
                "uid": "4bd46eb0-0597-48a1-8d1a-e9977871aebd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "system:image-builders",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175211",
                "uid": "cacc16e7-1088-46a6-a2a3-02b3fd2ca0ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:58:07Z",
                "name": "system:image-pullers",
                "namespace": "dr-test-moshekipod-backwards-compat-dr",
                "resourceVersion": "175191",
                "uid": "cd0f38fe-5bca-4b81-bc14-8beca9480d83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dr-test-moshekipod-backwards-compat-dr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dummy-service",
                "resourceVersion": "23097",
                "uid": "15c72b3b-fe2e-4622-8cbd-c6b7b8c8a1b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dummy-service",
                "resourceVersion": "23373",
                "uid": "1deaead9-1f7d-486a-af37-568e2b847deb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:42Z",
                "name": "dedicated-admins-0",
                "namespace": "dummy-service",
                "resourceVersion": "23211",
                "uid": "0abf0e8f-ebd0-48fb-8544-4c6830ff3535"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-1",
                "namespace": "dummy-service",
                "resourceVersion": "23259",
                "uid": "d856649d-5985-4599-9f32-45a534521abb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dummy-service",
                "resourceVersion": "24022",
                "uid": "ea538812-38af-4bbe-aeab-18f79762a438"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "system:deployers",
                "namespace": "dummy-service",
                "resourceVersion": "19858",
                "uid": "5f170a1c-afa4-4d5d-b0b8-e09e3cbc05b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "system:image-builders",
                "namespace": "dummy-service",
                "resourceVersion": "19861",
                "uid": "ec127510-7099-4172-b031-a3a5ca1eeb3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "system:image-pullers",
                "namespace": "dummy-service",
                "resourceVersion": "19863",
                "uid": "e1a528e3-5c70-4a12-83d1-9ce61b39efcb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:55:58Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "e2e-secrets",
                "resourceVersion": "48218",
                "uid": "182b2c40-cdb4-4de1-bca5-a4988a73b7c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:55:54Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "e2e-secrets",
                "resourceVersion": "48141",
                "uid": "f1a77ff4-a6db-4abc-86d2-1a89481f9e09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:55:53Z",
                "name": "dedicated-admins-0",
                "namespace": "e2e-secrets",
                "resourceVersion": "48136",
                "uid": "57b15744-c82f-4beb-8c95-13e29038edab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:55:54Z",
                "name": "dedicated-admins-1",
                "namespace": "e2e-secrets",
                "resourceVersion": "48147",
                "uid": "b341c6ff-d445-408c-9e4a-fcb04d2ee830"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:55:51Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "e2e-secrets",
                "resourceVersion": "48094",
                "uid": "57dc08b9-78e6-4773-aa98-7c54667dee48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:55:51Z",
                "name": "system:deployers",
                "namespace": "e2e-secrets",
                "resourceVersion": "48105",
                "uid": "43e342f1-41eb-42e6-9217-b9a4160b7c76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "e2e-secrets"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:55:51Z",
                "name": "system:image-builders",
                "namespace": "e2e-secrets",
                "resourceVersion": "48106",
                "uid": "216c08b4-86a2-4f20-b06a-7b3cc794d3ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "e2e-secrets"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:55:51Z",
                "name": "system:image-pullers",
                "namespace": "e2e-secrets",
                "resourceVersion": "48102",
                "uid": "a1a94473-1ac5-4ea8-9157-7d0e1498362f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:e2e-secrets"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23084",
                "uid": "7469d24a-ce2f-4c7a-8880-43cadc0845dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23661",
                "uid": "d3ae8371-4ca2-4bbf-86f8-5670981021ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23274",
                "uid": "5f8fee6d-59ae-4ef6-b9dd-cf777f68795e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admins-1",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23369",
                "uid": "1fc4cf59-21b0-41eb-af2c-d256c498b69b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23775",
                "uid": "d4c08cbd-3e7f-465f-a1d8-b06f4e3b96c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "enterprise-contract-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:enterprise-contract-service/public-ec-cm",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"enterprise-contract-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:enterprise-contract-service/public-ec-cm\"},\"name\":\"public-ec-cm\",\"namespace\":\"enterprise-contract-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"enterprisecontract-configmap-viewer-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "public-ec-cm",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23560",
                "uid": "4ba574b4-5986-454d-9eb4-1eaff52936ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontract-configmap-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "enterprise-contract-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:enterprise-contract-service/public-ecp",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"enterprise-contract-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:enterprise-contract-service/public-ecp\"},\"name\":\"public-ecp\",\"namespace\":\"enterprise-contract-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"enterprisecontractpolicy-viewer-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "public-ecp",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "23569",
                "uid": "c0a23841-9904-4d83-8f6d-a07326135169"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "enterprisecontractpolicy-viewer-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "system:deployers",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "20197",
                "uid": "f9f13c67-b173-43ae-b81e-2fd55e69f4c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "system:image-builders",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "20199",
                "uid": "b050adc5-fe6d-448c-a7fb-bddc3a105dc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "system:image-pullers",
                "namespace": "enterprise-contract-service",
                "resourceVersion": "20198",
                "uid": "90238ad8-23df-4b82-8e52-e0ab8b60dec6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:enterprise-contract-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:12Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "60706",
                "uid": "2bcb5c92-eaca-446b-b32a-c5da47c52375"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:17Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "61183",
                "uid": "572179da-2913-4a5e-8c6e-57cda3b42da3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:24Z",
                "name": "dedicated-admins-0",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "61635",
                "uid": "39fbf585-2865-4fe5-b756-097b25faf955"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:16Z",
                "name": "dedicated-admins-1",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "61127",
                "uid": "517a68f0-c8af-4818-83be-21845b130bc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:13Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "60782",
                "uid": "d8d743d8-cdda-4740-b8ad-766632d09dfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:06Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "8bac41cc-1220-427d-8a9b-248bd1546fef",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "60262",
                "uid": "493de193-3b5c-4b39-b3c0-9f9ea374ed79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "gitlab-rep-sker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:06Z",
                "name": "kubearchive-sink",
                "namespace": "gitlab-rep-sker",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "4a4d3c77-f46f-43cc-a3f6-db2b2f9f801e"
                    }
                ],
                "resourceVersion": "60211",
                "uid": "9a262f3f-15d6-4e72-bb88-8a238ecf86fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:00:06Z",
                "name": "kubearchive-vacuum",
                "namespace": "gitlab-rep-sker",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "4a4d3c77-f46f-43cc-a3f6-db2b2f9f801e"
                    }
                ],
                "resourceVersion": "60231",
                "uid": "05b17d28-5c5f-46d1-b9b1-67e1c58c9d13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "gitlab-rep-sker"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:00:06Z",
                "name": "system:deployers",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "60222",
                "uid": "10ecfaaf-2cf4-4772-88fe-aebf4730840b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "gitlab-rep-sker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:00:06Z",
                "name": "system:image-builders",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "60182",
                "uid": "48eec8e0-4f8c-4aa0-9c65-95ff3ab74a6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "gitlab-rep-sker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:00:06Z",
                "name": "system:image-pullers",
                "namespace": "gitlab-rep-sker",
                "resourceVersion": "60217",
                "uid": "a2a9a27a-0258-475c-98ec-763234138f84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:gitlab-rep-sker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:03Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "group-rvbr",
                "resourceVersion": "53752",
                "uid": "42b99ec8-e477-468d-b808-acff1c01266f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:13Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "group-rvbr",
                "resourceVersion": "54527",
                "uid": "d7d46b4b-0e51-40fb-a31f-a06bc17a9700"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "dedicated-admins-0",
                "namespace": "group-rvbr",
                "resourceVersion": "54951",
                "uid": "b5006612-6b69-4eeb-88fc-8e72adfb2379"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "dedicated-admins-1",
                "namespace": "group-rvbr",
                "resourceVersion": "51663",
                "uid": "8dde611e-4054-469c-a9a1-ac5008f61563"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "group-rvbr",
                "resourceVersion": "53129",
                "uid": "f38e124c-9ba6-418b-9057-2a72dd3808b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "386b21e8-9693-420d-b20a-c5df9c575690",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "group-rvbr",
                "resourceVersion": "53266",
                "uid": "c5b5fa93-4402-4376-ae1a-895e1b13216e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "group-rvbr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:11Z",
                "name": "kubearchive-sink",
                "namespace": "group-rvbr",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "4371fc55-66c3-48ec-b203-a0fe4b0b1585"
                    }
                ],
                "resourceVersion": "54365",
                "uid": "0bdfdfd6-e63a-494e-8013-5d9bcbb9da11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:11Z",
                "name": "kubearchive-vacuum",
                "namespace": "group-rvbr",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "4371fc55-66c3-48ec-b203-a0fe4b0b1585"
                    }
                ],
                "resourceVersion": "55439",
                "uid": "b1798e9c-ade6-4b88-930e-34935afc25bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "group-rvbr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:deployers",
                "namespace": "group-rvbr",
                "resourceVersion": "50528",
                "uid": "f5d26f09-4eea-40f1-9ef8-5f04906de42a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "group-rvbr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-builders",
                "namespace": "group-rvbr",
                "resourceVersion": "50523",
                "uid": "7b7c598e-3af8-4090-89fe-7a69b1246fe1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "group-rvbr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:11Z",
                "name": "system:image-pullers",
                "namespace": "group-rvbr",
                "resourceVersion": "50507",
                "uid": "6a18e675-a78b-4bc2-8972-f3d2346af834"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:group-rvbr"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "image-controller",
                "resourceVersion": "19040",
                "uid": "73952361-2eb5-4d9a-b0a8-0f1dbac559c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "image-controller",
                "resourceVersion": "19037",
                "uid": "4c702105-101d-4f02-a28b-3abfc6e8047a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admins-0",
                "namespace": "image-controller",
                "resourceVersion": "19035",
                "uid": "ba23292e-6ad1-4f00-8091-2fec4d678df7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:49Z",
                "name": "dedicated-admins-1",
                "namespace": "image-controller",
                "resourceVersion": "19048",
                "uid": "1c5b231e-53c7-4e16-9bf3-00524668d91d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "image-controller",
                "resourceVersion": "19039",
                "uid": "bb036f39-5632-41d9-ab84-71a3ffacec9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-controller/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-controller/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"image-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:12Z",
                "name": "grant-argocd",
                "namespace": "image-controller",
                "resourceVersion": "20254",
                "uid": "076aa399-2b42-4d54-8a20-e6703ccf14af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-controller/image-controller-admins",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-controller/image-controller-admins\"},\"name\":\"image-controller-admins\",\"namespace\":\"image-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"image-controller-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build-admins\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:12Z",
                "name": "image-controller-admins",
                "namespace": "image-controller",
                "resourceVersion": "20253",
                "uid": "d41c6c9a-4988-427b-b8eb-6bad640bc89f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "image-controller-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-controller/image-controller-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-controller/image-controller-leader-election-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"image-controller\"},\"name\":\"image-controller-leader-election-rolebinding\",\"namespace\":\"image-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"image-controller-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller"
                },
                "name": "image-controller-leader-election-rolebinding",
                "namespace": "image-controller",
                "resourceVersion": "20255",
                "uid": "230a47a2-e3f6-41d5-b6d6-a831016c87c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "image-controller-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:44Z",
                "name": "system:deployers",
                "namespace": "image-controller",
                "resourceVersion": "18984",
                "uid": "b458c970-0dd9-44be-9223-97fddb7be978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:44Z",
                "name": "system:image-builders",
                "namespace": "image-controller",
                "resourceVersion": "18985",
                "uid": "9e6fa463-bba1-4dda-b22d-a7c6f6db32bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:44Z",
                "name": "system:image-pullers",
                "namespace": "image-controller",
                "resourceVersion": "18983",
                "uid": "ea71835a-021a-40df-be0f-9a46ccd9976a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:40Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "23016",
                "uid": "4022e0bd-c411-4ff9-9e82-411f7596d6fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "23561",
                "uid": "43e08c18-3125-462d-be6b-6214c74b17e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-0",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "23309",
                "uid": "78b8a2be-28c2-4535-be7d-ae03850ee4ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-1",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "23329",
                "uid": "9bf98d5f-c852-450b-8e3d-b290af2187dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "23480",
                "uid": "174f288d-0f85-4c45-b3d7-f3f1f2325072"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-rbac-proxy/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-rbac-proxy/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"image-rbac-proxy\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:33Z",
                "name": "grant-argocd",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "22103",
                "uid": "d99ead69-cbd6-496e-8235-3d0e09844949"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-rbac-proxy/oauth-secret-generator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:image-rbac-proxy/oauth-secret-generator\"},\"name\":\"oauth-secret-generator\",\"namespace\":\"image-rbac-proxy\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"oauth-secret-generator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"oauth-secret-generator\",\"namespace\":\"image-rbac-proxy\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:33Z",
                "name": "oauth-secret-generator",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "22115",
                "uid": "ba195c88-9c4e-44cb-9e56-f637b584641d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "oauth-secret-generator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "oauth-secret-generator",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:26Z",
                "name": "system:deployers",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "21801",
                "uid": "99fbc2f3-d4f1-41f4-ba03-4d6effc39176"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:26Z",
                "name": "system:image-builders",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "21803",
                "uid": "123894a1-ae38-4c62-b233-fc8c29a61c57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:26Z",
                "name": "system:image-pullers",
                "namespace": "image-rbac-proxy",
                "resourceVersion": "21802",
                "uid": "10b0159f-a965-4dc6-8f44-35f83513d376"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:29Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "integration-service",
                "resourceVersion": "27184",
                "uid": "95058280-bbd4-4bf2-a147-86c7962378aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "integration-service",
                "resourceVersion": "27412",
                "uid": "cba8ead2-9a5f-4827-a040-38b766c4a316"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admins-0",
                "namespace": "integration-service",
                "resourceVersion": "27286",
                "uid": "ef1674b0-9320-455f-ad52-2ed9dfd809d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:26Z",
                "name": "dedicated-admins-1",
                "namespace": "integration-service",
                "resourceVersion": "26661",
                "uid": "3fe79690-e165-4e9f-af7d-847bceea4ff2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:35Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "integration-service",
                "resourceVersion": "27449",
                "uid": "baa63291-3681-489d-8f11-1cd3c00ac9bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:integration-service/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:integration-service/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"integration-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "grant-argocd",
                "namespace": "integration-service",
                "resourceVersion": "26571",
                "uid": "281201b4-dd82-4729-ad55-f863b9d7eb4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:integration-service/integration-service-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:integration-service/integration-service-leader-election-rolebinding\"},\"name\":\"integration-service-leader-election-rolebinding\",\"namespace\":\"integration-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"integration-service-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "integration-service-leader-election-rolebinding",
                "namespace": "integration-service",
                "resourceVersion": "26582",
                "uid": "7cb4ab59-9255-4edd-bcb6-26a747da1589"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "integration-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:integration-service/integration-service-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:integration-service/integration-service-maintainers\"},\"name\":\"integration-service-maintainers\",\"namespace\":\"integration-service\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "integration-service-maintainers",
                "namespace": "integration-service",
                "resourceVersion": "26579",
                "uid": "8931ecca-440c-45dc-8a49-b0fbdcc76030"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:18Z",
                "name": "system:deployers",
                "namespace": "integration-service",
                "resourceVersion": "26255",
                "uid": "adfb5c18-2f2b-416c-a6d5-3c025c9b209a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:18Z",
                "name": "system:image-builders",
                "namespace": "integration-service",
                "resourceVersion": "26274",
                "uid": "a3314753-8a94-4156-95dd-84aa4636c932"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:18Z",
                "name": "system:image-pullers",
                "namespace": "integration-service",
                "resourceVersion": "26254",
                "uid": "404f454e-6567-4200-91e6-5e5ab327a0f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "integration1-xjus",
                "resourceVersion": "53991",
                "uid": "4d2ed354-f72b-4978-8cfa-25dcdc985df0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "integration1-xjus",
                "resourceVersion": "53245",
                "uid": "7653624d-8bb1-4959-9c72-5459fd51aa85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "dedicated-admins-0",
                "namespace": "integration1-xjus",
                "resourceVersion": "54886",
                "uid": "74d09259-4b36-49d6-8ca6-c1bfd2a99d68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:20Z",
                "name": "dedicated-admins-1",
                "namespace": "integration1-xjus",
                "resourceVersion": "51700",
                "uid": "5867a7e5-0285-42cb-a550-ff93ddcf98cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "integration1-xjus",
                "resourceVersion": "53142",
                "uid": "5c5ad2b7-6a20-4359-b0c0-56ad1e458845"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:51Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "568c5042-9fdb-41fa-8780-27292944c122",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "integration1-xjus",
                "resourceVersion": "52747",
                "uid": "845566f1-dc8f-4260-a3ac-70dc6a204e0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "integration1-xjus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:08Z",
                "name": "kubearchive-sink",
                "namespace": "integration1-xjus",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "43fb7109-babc-4269-ae7b-68956dbc1d0e"
                    }
                ],
                "resourceVersion": "54166",
                "uid": "288464d7-38b3-48cb-bc53-12017967a78c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:09Z",
                "name": "kubearchive-vacuum",
                "namespace": "integration1-xjus",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "43fb7109-babc-4269-ae7b-68956dbc1d0e"
                    }
                ],
                "resourceVersion": "54252",
                "uid": "47264a88-da55-4625-a4b9-29f55727bd1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "integration1-xjus"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:deployers",
                "namespace": "integration1-xjus",
                "resourceVersion": "50305",
                "uid": "c051727a-fbac-426d-81ab-03643774f31d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "integration1-xjus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-builders",
                "namespace": "integration1-xjus",
                "resourceVersion": "50295",
                "uid": "569b53c1-91fa-4156-9540-ef2613ec7800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "integration1-xjus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:10Z",
                "name": "system:image-pullers",
                "namespace": "integration1-xjus",
                "resourceVersion": "50289",
                "uid": "3f3c9d74-16c1-491e-88c4-e4c8af03c8db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:integration1-xjus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "integration2-ilon",
                "resourceVersion": "98726",
                "uid": "f87c1d13-2df9-43c5-bfcb-bd3339e2d915"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:13Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "integration2-ilon",
                "resourceVersion": "99664",
                "uid": "f63740f0-b100-4220-aecc-2c07c6af1aec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:12Z",
                "name": "dedicated-admins-0",
                "namespace": "integration2-ilon",
                "resourceVersion": "99413",
                "uid": "ec7c8600-0545-4f71-a622-9e6d17c4f18c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:11Z",
                "name": "dedicated-admins-1",
                "namespace": "integration2-ilon",
                "resourceVersion": "99271",
                "uid": "20bb7298-a32d-404c-a430-5da58732f3d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "integration2-ilon",
                "resourceVersion": "98831",
                "uid": "6c239303-7eb8-4a18-9508-d220110d3538"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "c1225c1e-b032-4997-b660-fd162bdca9d4",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "integration2-ilon",
                "resourceVersion": "98874",
                "uid": "b45e37d6-7ee4-4531-8b81-1103df37d309"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "integration2-ilon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "name": "kubearchive-sink",
                "namespace": "integration2-ilon",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "ff2e5540-d000-4996-98ae-2be49cbeba27"
                    }
                ],
                "resourceVersion": "98856",
                "uid": "74e9504a-ee59-4b1f-b859-1ac443c1e62b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "name": "kubearchive-vacuum",
                "namespace": "integration2-ilon",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "ff2e5540-d000-4996-98ae-2be49cbeba27"
                    }
                ],
                "resourceVersion": "98873",
                "uid": "49b7c44b-95e1-49e1-84d0-0a1d55b1e04c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "integration2-ilon"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "name": "system:deployers",
                "namespace": "integration2-ilon",
                "resourceVersion": "98790",
                "uid": "65f0bb07-e6fc-4940-a6b5-5772a183f02e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "integration2-ilon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "name": "system:image-builders",
                "namespace": "integration2-ilon",
                "resourceVersion": "98793",
                "uid": "0da9ba55-cc09-4765-baab-460d24e78c8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "integration2-ilon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T19:13:05Z",
                "name": "system:image-pullers",
                "namespace": "integration2-ilon",
                "resourceVersion": "98769",
                "uid": "b7836deb-508f-48a9-8dfb-564fd7955371"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:integration2-ilon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "internal-services",
                "resourceVersion": "23110",
                "uid": "b9e1e31c-566c-4188-a2c8-27b0855047b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "internal-services",
                "resourceVersion": "23580",
                "uid": "0f5fca0c-828e-45dd-95f4-8f4bb26a922c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "internal-services",
                "resourceVersion": "23218",
                "uid": "229f463e-f882-49a9-981e-f1e9c4586d31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-1",
                "namespace": "internal-services",
                "resourceVersion": "23248",
                "uid": "6a7d733a-fd1b-4834-9e12-51100c1feb3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "internal-services",
                "resourceVersion": "23662",
                "uid": "92c40be7-1d42-4790-a430-d66a5c1631e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "internal-services-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:internal-services/internal-services",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"internal-services-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:internal-services/internal-services\"},\"name\":\"internal-services\",\"namespace\":\"internal-services\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-release-team\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "internal-services",
                "namespace": "internal-services",
                "resourceVersion": "26024",
                "uid": "92d0a299-0279-43c3-9d92-7f783635846a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-release-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "system:deployers",
                "namespace": "internal-services",
                "resourceVersion": "21590",
                "uid": "98bae6de-a1ea-461b-b4fc-253e9f74e319"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "internal-services"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "system:image-builders",
                "namespace": "internal-services",
                "resourceVersion": "21589",
                "uid": "8c597935-4a4e-48ac-a4cf-0e403cf568ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "internal-services"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "system:image-pullers",
                "namespace": "internal-services",
                "resourceVersion": "21588",
                "uid": "7645603a-a6ea-4d75-990e-c2c08e2323f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:internal-services"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "knative-eventing",
                "resourceVersion": "23088",
                "uid": "b8a26150-ed20-464e-9ecd-537d3a94fad8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "knative-eventing",
                "resourceVersion": "23481",
                "uid": "a0426d49-2948-4063-86d6-9d314dd6e613"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-0",
                "namespace": "knative-eventing",
                "resourceVersion": "23342",
                "uid": "9f29267f-c2bd-4644-b3bd-2dc647a926a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admins-1",
                "namespace": "knative-eventing",
                "resourceVersion": "23379",
                "uid": "318fa80f-2786-4a9e-a252-fa0f913c066e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "knative-eventing",
                "resourceVersion": "23524",
                "uid": "f2183716-1a06-4bd8-8396-1b7129d06d9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/eventing-webhook",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/eventing-webhook\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"knative-eventing-webhook\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook",
                "namespace": "knative-eventing",
                "resourceVersion": "23763",
                "uid": "d8c7d3c9-4f44-4000-9216-5b3f2a2441f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "knative-eventing-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/imc-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/imc-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-controller\",\"namespace\":\"knative-eventing\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"knative-inmemorychannel-webhook\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-controller",
                "namespace": "knative-eventing",
                "resourceVersion": "23743",
                "uid": "bb368f9b-0e28-4b7f-8896-7d536bf93449"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "knative-inmemorychannel-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/imc-dispatcher-tls-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/imc-dispatcher-tls-role-binding\"},\"name\":\"imc-dispatcher-tls-role-binding\",\"namespace\":\"knative-eventing\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"imc-dispatcher-tls-role\"},\"subjects\":[{\"apiGroup\":\"\",\"kind\":\"ServiceAccount\",\"name\":\"imc-dispatcher\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "imc-dispatcher-tls-role-binding",
                "namespace": "knative-eventing",
                "resourceVersion": "23749",
                "uid": "6f83e9eb-7a14-4f4f-be5f-6209acc29b60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "imc-dispatcher-tls-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-dispatcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/mt-broker-filter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/mt-broker-filter\"},\"name\":\"mt-broker-filter\",\"namespace\":\"knative-eventing\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"mt-broker-filter\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mt-broker-filter\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "mt-broker-filter",
                "namespace": "knative-eventing",
                "resourceVersion": "23748",
                "uid": "d453fbb7-ebf9-4f5d-995e-c2359ae9acc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "mt-broker-filter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mt-broker-filter",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/mt-broker-ingress",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:knative-eventing/mt-broker-ingress\"},\"name\":\"mt-broker-ingress\",\"namespace\":\"knative-eventing\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"mt-broker-ingress\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mt-broker-ingress\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "mt-broker-ingress",
                "namespace": "knative-eventing",
                "resourceVersion": "23762",
                "uid": "4b3d00c2-c521-4288-9b21-7a509820e68c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "mt-broker-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mt-broker-ingress",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "system:deployers",
                "namespace": "knative-eventing",
                "resourceVersion": "22846",
                "uid": "0db2bb0a-d595-4735-892d-ff76de96871a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "system:image-builders",
                "namespace": "knative-eventing",
                "resourceVersion": "22871",
                "uid": "7e558cbd-af46-4ad8-8977-c06e3e3b178f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "system:image-pullers",
                "namespace": "knative-eventing",
                "resourceVersion": "22872",
                "uid": "952ac17b-6f54-4ce8-8b95-776e4fb7ac0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:44:45Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38826",
                "uid": "7af33cfd-48d5-41e3-b07b-974be70e9e00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:44:41Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38741",
                "uid": "ba51123a-b375-4ff4-b7b9-c2532fe809e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:44:40Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38736",
                "uid": "d410dd4e-bea5-44e9-b841-999f84016cc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:44:40Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38731",
                "uid": "14be2982-e047-46f0-8413-5ad90a3d0904"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:44:41Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38747",
                "uid": "2a609156-dc6b-4411-b656-9df0e934ffa5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:44:38Z",
                "name": "system:deployers",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38684",
                "uid": "58ae255d-9fe4-405e-938d-5ca1a9999157"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-disaster-recovery"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:44:38Z",
                "name": "system:image-builders",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38685",
                "uid": "f0a9baa8-e448-42ed-9288-493418664743"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-disaster-recovery"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:44:38Z",
                "name": "system:image-pullers",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38690",
                "uid": "cb97ecc3-c57a-4887-b683-6128c07ba73d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-disaster-recovery"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "disaster-recovery-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-disaster-recovery/triggers-cron-eventlistener-binding-r"
                },
                "creationTimestamp": "2026-05-10T18:44:39Z",
                "name": "triggers-cron-eventlistener-binding-r",
                "namespace": "konflux-disaster-recovery",
                "resourceVersion": "38692",
                "uid": "2dc3e9c8-88aa-4b2c-bb3e-595400ccd38a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-eventlistener-roles"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cron-trigger",
                    "namespace": "konflux-disaster-recovery"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:39Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-info",
                "resourceVersion": "22974",
                "uid": "2bf510e4-d0c9-4c2c-8713-581d3b886d3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-info",
                "resourceVersion": "23744",
                "uid": "094c597a-a11d-47ff-ada8-e461e03648f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-info",
                "resourceVersion": "23226",
                "uid": "5af0553e-2ce9-4341-9dbe-86748a0d3ce9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-info",
                "resourceVersion": "23332",
                "uid": "0b370cf4-eb22-465b-8990-9667bf8e9d13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-info",
                "resourceVersion": "23713",
                "uid": "43d43e91-ef83-4abc-9f38-6b87f0b7b488"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "konflux-info-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-info/konflux-public-info-view-rb",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"konflux-info-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-info/konflux-public-info-view-rb\"},\"name\":\"konflux-public-info-view-rb\",\"namespace\":\"konflux-info\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"konflux-public-info-view-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:32Z",
                "name": "konflux-public-info-view-rb",
                "namespace": "konflux-info",
                "resourceVersion": "22043",
                "uid": "b44abeb0-a601-434d-8006-9da503978303"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-public-info-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:06Z",
                "name": "system:deployers",
                "namespace": "konflux-info",
                "resourceVersion": "19646",
                "uid": "614370df-0994-450b-a4dc-df9bcbe29ae5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:06Z",
                "name": "system:image-builders",
                "namespace": "konflux-info",
                "resourceVersion": "19647",
                "uid": "6a17d2e3-8ac0-4b6b-9d9c-4cd78f7bac68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:06Z",
                "name": "system:image-pullers",
                "namespace": "konflux-info",
                "resourceVersion": "19645",
                "uid": "10a22741-ebe3-47e5-aaae-3a9c5689e73f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-info"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:40Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-kite",
                "resourceVersion": "23060",
                "uid": "73b575c1-827b-45c4-b265-2e9d0eefb39b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-kite",
                "resourceVersion": "23813",
                "uid": "8db9d3c5-bb2e-49e7-b232-ffb1f2f59d19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:42Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-kite",
                "resourceVersion": "23213",
                "uid": "6401c1be-be34-4b26-8946-0087a65aec32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-kite",
                "resourceVersion": "23336",
                "uid": "2d456e0c-5cf0-4a54-bc6c-a7017cc51cac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-kite",
                "resourceVersion": "23798",
                "uid": "4f6496a8-11cf-4035-8703-be6ffcf1122f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "konflux-kite-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kite/konflux-kite-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"konflux-kite-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kite/konflux-kite-admin\"},\"name\":\"konflux-kite-admin\",\"namespace\":\"konflux-kite\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-ui\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:17Z",
                "name": "konflux-kite-admin",
                "namespace": "konflux-kite",
                "resourceVersion": "20672",
                "uid": "74a138c0-ee7b-47c0-980b-f7b611ad1afb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "konflux-kite-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kite/konflux-kite-component-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"konflux-kite-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kite/konflux-kite-component-maintainers\"},\"name\":\"konflux-kite-component-maintainers\",\"namespace\":\"konflux-kite\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-ui\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:38:17Z",
                "name": "konflux-kite-component-maintainers",
                "namespace": "konflux-kite",
                "resourceVersion": "20689",
                "uid": "a26fa541-aef1-46a0-8177-4838196759ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-ui"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "system:deployers",
                "namespace": "konflux-kite",
                "resourceVersion": "20173",
                "uid": "c571a17f-c57b-4fa1-a3c2-8fd54d5a8d09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-kite"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "system:image-builders",
                "namespace": "konflux-kite",
                "resourceVersion": "20174",
                "uid": "2b58ff68-cc14-4679-810b-525bb8ebea26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-kite"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "system:image-pullers",
                "namespace": "konflux-kite",
                "resourceVersion": "20172",
                "uid": "49115d79-2aa0-4b90-bfa6-f0de675a9ce7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-kite"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28843",
                "uid": "ce79a0dd-a768-428c-bfc9-547f1295abdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:17Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28896",
                "uid": "8dd745ee-c329-4cf7-adb3-7b09db921955"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:11Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28675",
                "uid": "4662315e-4ce4-4ddb-97d9-1956fe21e40b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:16Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28845",
                "uid": "32d44148-9cd5-40bf-a21b-e5dcfe4820f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:19Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-kyverno",
                "resourceVersion": "29008",
                "uid": "38cde104-68a8-4f09-9411-4b466e07db5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kyverno/konflux-kyverno:admission-controller"
                },
                "creationTimestamp": "2026-05-10T18:41:21Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:admission-controller",
                "namespace": "konflux-kyverno",
                "resourceVersion": "32195",
                "uid": "bfff7d5c-414a-40aa-aba4-3b14d102de37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-kyverno:admission-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kyverno/konflux-kyverno:background-controller"
                },
                "creationTimestamp": "2026-05-10T18:41:21Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:background-controller",
                "namespace": "konflux-kyverno",
                "resourceVersion": "32196",
                "uid": "d8ae1414-8a5f-4eb0-a3ee-163eefcd0935"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-kyverno:background-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-kyverno/konflux-kyverno:cleanup-controller"
                },
                "creationTimestamp": "2026-05-10T18:41:21Z",
                "labels": {
                    "app.kubernetes.io/component": "cleanup-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:cleanup-controller",
                "namespace": "konflux-kyverno",
                "resourceVersion": "32194",
                "uid": "4c78cdc7-474c-4c22-8bd5-4c09b1ca7e65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "konflux-kyverno:cleanup-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-cleanup-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:40:08Z",
                "name": "system:deployers",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28617",
                "uid": "09179afa-03b0-439e-a08f-9bac15dac4f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:40:08Z",
                "name": "system:image-builders",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28618",
                "uid": "e96e9968-4b1c-4fc3-a502-b2342ba6c24f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:40:08Z",
                "name": "system:image-pullers",
                "namespace": "konflux-kyverno",
                "resourceVersion": "28616",
                "uid": "bd5902d4-13e1-45d3-b06a-26f2da7ddc06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:40Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-otel",
                "resourceVersion": "23069",
                "uid": "c053d3a6-5c3e-487e-9a63-a99749d4ad20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-otel",
                "resourceVersion": "23494",
                "uid": "0f1ece35-68c8-4a8d-a43a-db014ef3349c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:45Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-otel",
                "resourceVersion": "23361",
                "uid": "3795e0c3-73fc-4449-82f9-bb70c431d81b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-otel",
                "resourceVersion": "23296",
                "uid": "e33edd59-0888-491f-921e-c844e4abac9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-otel",
                "resourceVersion": "23766",
                "uid": "bb077f4f-2a0b-4c5d-9daa-630dbbc61521"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "system:deployers",
                "namespace": "konflux-otel",
                "resourceVersion": "22568",
                "uid": "14b4b342-09f3-4064-b12b-bdd2ec58d24e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-otel"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "system:image-builders",
                "namespace": "konflux-otel",
                "resourceVersion": "22625",
                "uid": "43f1fc7a-ab64-49e1-a83f-fc06760e40a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-otel"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "system:image-pullers",
                "namespace": "konflux-otel",
                "resourceVersion": "22624",
                "uid": "b752c279-e263-4779-bd23-ef5e43f8df58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-otel"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:28Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "27078",
                "uid": "760168b7-5260-4c28-9410-6b963dbc40a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:34Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "27418",
                "uid": "fe586588-89e6-4136-a0d2-3b35763a0d24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:29Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "27194",
                "uid": "9c8710ef-6719-4b8b-b47e-407f33e773f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:26Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "26721",
                "uid": "5085592e-7571-4079-a273-aa2084dac3f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "27370",
                "uid": "8f178de8-5171-4634-931b-384504a581f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-perfscale-1-tenant/perf-team-event-reader-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-perfscale-1-tenant/perf-team-event-reader-binding\"},\"name\":\"perf-team-event-reader-binding\",\"namespace\":\"konflux-perfscale-1-tenant\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"perf-team-event-reader-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-bot-0\",\"namespace\":\"konflux-perfscale-1-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "perf-team-event-reader-binding",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "26051",
                "uid": "930766af-50ff-4d5a-95a0-e1af4e39681f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "perf-team-event-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-bot-0",
                    "namespace": "konflux-perfscale-1-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:deployers",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "25659",
                "uid": "a21f3131-3f4b-4a77-9816-1bbfda37518e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-perfscale-1-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:image-builders",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "25658",
                "uid": "c71e4cf8-df94-4672-8019-ee8c01bbf5d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-perfscale-1-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:image-pullers",
                "namespace": "konflux-perfscale-1-tenant",
                "resourceVersion": "25657",
                "uid": "ed333963-a9cf-43ca-86d2-7de5243b3ab4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-perfscale-1-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:27Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "26912",
                "uid": "d5cae822-1de8-452f-8a2b-99431ed204a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "27359",
                "uid": "04ccae42-f7f6-4eb4-a6a1-e4b90c0212e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "27267",
                "uid": "60fbff0c-bdee-43f3-8484-ac6ded71293a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:26Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "26731",
                "uid": "61244ea0-022c-43c9-b607-96d5c8f0c7ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "27321",
                "uid": "2799b6e1-5777-43d6-850e-e16776260388"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-perfscale-2-tenant/perf-team-event-reader-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-perfscale-2-tenant/perf-team-event-reader-binding\"},\"name\":\"perf-team-event-reader-binding\",\"namespace\":\"konflux-perfscale-2-tenant\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"perf-team-event-reader-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-bot-0\",\"namespace\":\"konflux-perfscale-2-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "perf-team-event-reader-binding",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "26036",
                "uid": "0f09afce-6f31-4408-8989-8bff546b2f88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "perf-team-event-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-bot-0",
                    "namespace": "konflux-perfscale-2-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:deployers",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "25655",
                "uid": "2341a83a-450e-49ff-82c2-cfcb9c28326f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-perfscale-2-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:image-builders",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "25660",
                "uid": "1b1c8946-928c-45b6-b454-37415311c025"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-perfscale-2-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:image-pullers",
                "namespace": "konflux-perfscale-2-tenant",
                "resourceVersion": "25656",
                "uid": "8ecd9f38-82c3-41fa-8900-6782a4026407"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-perfscale-2-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:28Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "27129",
                "uid": "30675664-ab1d-4482-b896-27e1844e5e08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "27273",
                "uid": "e872a927-5395-4f78-ae43-5c26c9a8d758"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "27290",
                "uid": "7ef544cc-7674-428b-a2bd-a1c4b1494c75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "26530",
                "uid": "eab0d2a3-a058-4038-82ec-3f47f9982e0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:34Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "27436",
                "uid": "e7b5046f-41e7-4edc-8736-f983cc702c3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-perfscale-3-tenant/perf-team-event-reader-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:konflux-perfscale-3-tenant/perf-team-event-reader-binding\"},\"name\":\"perf-team-event-reader-binding\",\"namespace\":\"konflux-perfscale-3-tenant\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"perf-team-event-reader-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-bot-0\",\"namespace\":\"konflux-perfscale-3-tenant\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "perf-team-event-reader-binding",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "26069",
                "uid": "b5a0b652-0de9-4ab7-a8b4-407761c92953"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "perf-team-event-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-bot-0",
                    "namespace": "konflux-perfscale-3-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:deployers",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "25661",
                "uid": "1724db28-2e5c-4808-8721-4348f100c140"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-perfscale-3-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:image-builders",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "25662",
                "uid": "de0a40bc-5ab1-4404-ba18-a92433626aee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-perfscale-3-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "system:image-pullers",
                "namespace": "konflux-perfscale-3-tenant",
                "resourceVersion": "25654",
                "uid": "7157bcd4-fa33-4a55-9db6-ac479424a927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-perfscale-3-tenant"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:01Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-policies",
                "resourceVersion": "33618",
                "uid": "396a4bf1-db7e-4441-af1b-dec86c026b4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:41:57Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-policies",
                "resourceVersion": "33495",
                "uid": "eb42de6d-c909-499a-9587-53daad32a7b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:41:57Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-policies",
                "resourceVersion": "33508",
                "uid": "ca4ebcc0-9ed6-4b1a-b9c1-145f4e5d470a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:03Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-policies",
                "resourceVersion": "33630",
                "uid": "069ae867-0da8-414c-9ec5-452a5957602b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:00Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-policies",
                "resourceVersion": "33571",
                "uid": "70cc4b9f-96fa-4203-9c7c-6a5bab9941f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:41:57Z",
                "name": "system:deployers",
                "namespace": "konflux-policies",
                "resourceVersion": "33505",
                "uid": "959c7ffe-5c5f-4157-8a16-588b005b234e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-policies"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:41:57Z",
                "name": "system:image-builders",
                "namespace": "konflux-policies",
                "resourceVersion": "33507",
                "uid": "a8630fbf-823b-4dcb-9761-ae30fb550008"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-policies"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:41:57Z",
                "name": "system:image-pullers",
                "namespace": "konflux-policies",
                "resourceVersion": "33513",
                "uid": "75667e7a-39a1-41ac-b7ac-098dee041151"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-policies"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:42Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "konflux-rbac",
                "resourceVersion": "23131",
                "uid": "7fa0de01-453e-4908-be48-0c96f15648f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:46Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "konflux-rbac",
                "resourceVersion": "23397",
                "uid": "b7fa5bd8-da0d-4de2-b32b-490327b17839"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-0",
                "namespace": "konflux-rbac",
                "resourceVersion": "23316",
                "uid": "dcd153e6-993d-4ca1-9285-eddb2dc846c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-1",
                "namespace": "konflux-rbac",
                "resourceVersion": "23310",
                "uid": "0d925d7e-8753-493c-a75e-0a69c0bfd121"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "konflux-rbac",
                "resourceVersion": "23772",
                "uid": "2bb6502a-fa3d-4e3b-8f67-d78162dc36f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "system:deployers",
                "namespace": "konflux-rbac",
                "resourceVersion": "19968",
                "uid": "41bf9494-9647-455a-a536-3323e9f3436c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "konflux-rbac"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "system:image-builders",
                "namespace": "konflux-rbac",
                "resourceVersion": "19967",
                "uid": "c762c046-bfe8-4f83-a051-9f8022f74d49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "konflux-rbac"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "system:image-pullers",
                "namespace": "konflux-rbac",
                "resourceVersion": "19966",
                "uid": "3273df1f-4890-441c-b3c3-3425ff7f4d28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:konflux-rbac"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6465",
                "uid": "fc703bf7-d5a0-4016-8a10-57514d39fc7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6754",
                "uid": "ca44a7d7-ed53-4db0-adc9-5bdf7d9def9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-cse-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5406",
                "uid": "59f513ac-0d86-48da-abd6-18cb9050825d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6460",
                "uid": "22d21690-8d08-4b2d-be47-d5260f67ad1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6128",
                "uid": "b1c12650-31db-4fe2-8e27-6acb42635569"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5790",
                "uid": "8772c64a-fc39-4c0f-8b3b-576ccab666c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6601",
                "uid": "a4914f74-026d-43b0-8b05-26d8087377af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5786",
                "uid": "44a75606-380f-4fff-88bb-8e125702b346"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5369",
                "uid": "f1de5362-a63e-4fc0-8be1-4d01dadf1f9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5479",
                "uid": "ce0dfe6c-1d3b-45d2-8f5e-99496fd892c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6144",
                "uid": "e87fe112-505d-408a-a4f0-0b8a1776ab2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "6280",
                "uid": "af80f8db-aa24-4c42-8168-cfaf504c5e01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5299",
                "uid": "f537b560-8964-4857-8ea6-45bd4ad61374"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "kube-node-lease",
                "resourceVersion": "2388",
                "uid": "a4a65bc1-a534-4314-9893-8f77e23b48b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "kube-node-lease",
                "resourceVersion": "2387",
                "uid": "c1ff27e9-a59a-4fda-960b-58f3e2c2b5bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "kube-node-lease",
                "resourceVersion": "2385",
                "uid": "2cd5c757-c2cd-420b-bb6a-9f32ba469799"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-public",
                "resourceVersion": "6434",
                "uid": "04e22026-739c-48f3-a143-368d4de54e00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "kube-public",
                "resourceVersion": "6814",
                "uid": "bda73ecd-f8b9-4454-9cd8-f3811a08a870"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "kube-public",
                "resourceVersion": "5282",
                "uid": "3da83aa3-9fc2-467b-8bb6-d9e12e8d40f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "kube-public",
                "resourceVersion": "6497",
                "uid": "f1c690bc-82e7-495b-9a38-2781321889d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-public",
                "resourceVersion": "6028",
                "uid": "de331fa1-1faa-474b-b8d1-c036f662d073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-public",
                "resourceVersion": "5825",
                "uid": "be4ca157-76af-44e7-b979-ad9217aee15e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-public",
                "resourceVersion": "6749",
                "uid": "d85ceaa2-f6e5-4309-90d5-847dc6087c72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-public",
                "resourceVersion": "5809",
                "uid": "14cb6346-c8b9-4e7e-988a-4baf538bfaf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "kube-public",
                "resourceVersion": "5463",
                "uid": "9fb69aec-c9e4-4a6a-978f-ff05d05c1fcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "kube-public",
                "resourceVersion": "5590",
                "uid": "a427c088-69af-4222-8396-f26364f13236"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-public",
                "resourceVersion": "6029",
                "uid": "912738bd-9383-4a81-91b6-2d726850bcc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-public",
                "resourceVersion": "6221",
                "uid": "1dd8a578-fdd3-453e-817c-3f02b3e9f84b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "kube-public",
                "resourceVersion": "5305",
                "uid": "12edf059-0495-42a4-b4d9-09fdb2fbffa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "270",
                "uid": "2052880b-1723-4eba-af3e-6446dc46ff6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:33Z",
                "name": "system:deployers",
                "namespace": "kube-public",
                "resourceVersion": "2350",
                "uid": "582c739b-d9ec-4870-9f3e-d9435b1cb1b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:33Z",
                "name": "system:image-builders",
                "namespace": "kube-public",
                "resourceVersion": "2279",
                "uid": "820fa30c-0fc2-41f6-a477-e939dd39031a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "kube-public",
                "resourceVersion": "2383",
                "uid": "1e0d52b7-21f2-47dd-926f-dfea69b022c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:22Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "authentication-reader-for-authenticated-users",
                "namespace": "kube-system",
                "resourceVersion": "1532",
                "uid": "cab807d1-9e4c-48fb-b173-0c94afa8807a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-system",
                "resourceVersion": "6379",
                "uid": "bc082723-259f-44e3-ba01-ef96e5ac9770"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "kube-system",
                "resourceVersion": "6757",
                "uid": "1b3bdcd7-0b0d-4327-a7c8-d651c7ef1840"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-cse-0",
                "namespace": "kube-system",
                "resourceVersion": "5262",
                "uid": "784b555c-c5b1-4dc6-a64f-248a1019e33c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "kube-system",
                "resourceVersion": "6483",
                "uid": "72cccf42-0798-4a7b-9a8d-2e2691a45ab9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-system",
                "resourceVersion": "6112",
                "uid": "689de69b-b642-40d6-934b-585be221ddc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-system",
                "resourceVersion": "5793",
                "uid": "482d2272-d9f8-4845-9e8c-7d8be67da873"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-system",
                "resourceVersion": "6736",
                "uid": "8d346321-e51a-4dc7-a53e-42c9fdc0214c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-system",
                "resourceVersion": "5867",
                "uid": "bedea310-b84f-43bf-b8fd-ae5084839dae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "kube-system",
                "resourceVersion": "5370",
                "uid": "751e101f-9fac-4af1-b086-ae10e3b13822"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-1",
                "namespace": "kube-system",
                "resourceVersion": "5421",
                "uid": "d3211b53-7485-42eb-b082-81c27a882aa0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-system",
                "resourceVersion": "6063",
                "uid": "e7268110-7754-419c-8864-2902b55f52e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-system",
                "resourceVersion": "6159",
                "uid": "953adbc3-2112-435b-bc36-85beac864bed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "kube-system",
                "resourceVersion": "5265",
                "uid": "6b3454ac-75d3-4f73-8767-da5bdc853a68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:04Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-cainjector:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "25141",
                "uid": "c11d9f1d-e929-4177-9c83-1491c8af59d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager-cainjector:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:19Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager:leaderelection",
                "namespace": "kube-system",
                "resourceVersion": "26303",
                "uid": "5e7dfa24-b5f6-43db-8528-f18410cb957a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cert-manager:leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2104",
                "uid": "c6254ecc-4534-400d-bda4-ede6d2f19da4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-operator",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2096",
                "uid": "c3baef94-fbe1-4b03-994d-464abe34c97d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:17Z",
                "name": "csi-snapshot-controller-operator-authentication-reader",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1197",
                "uid": "4ffe0139-4758-4a42-91f7-8f3218b5c158"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:08Z",
                "name": "insights-operator-auth",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "920",
                "uid": "1f5c9d27-c561-4d29-8f52-0d9c744eeb17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:26Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-visibility-server-auth-reader",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4a70c7f9-1771-44fa-bee1-0d305218a2cf"
                    }
                ],
                "resourceVersion": "37053",
                "uid": "c421448f-c195-4833-a1e1-437ef7cf10a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:21Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server-auth-reader",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "11722",
                "uid": "8fb9e219-21b5-4ddf-baba-5fed7b7bc936"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:51Z",
                "name": "network-diagnostics",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3777",
                "uid": "73729193-cb17-4bff-b421-c0e9569bb1f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:18Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator-controller-manager-service-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "17143",
                "uid": "8608b987-f25d-4861-a8c5-1f2d4bdcbb34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:23Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "namespace": "kube-system",
                "resourceVersion": "11942",
                "uid": "5a10221e-cd06-47ac-beba-7699002aeb0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:33Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "264",
                "uid": "ee5a645b-8a9e-460d-bb87-a334267ee912"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:33Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "265",
                "uid": "f03eee8d-e5fe-44ef-9a63-c594e346d1a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:33Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "266",
                "uid": "d581504f-dfb6-42a9-b84a-50da364bf0d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:33Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "267",
                "uid": "f14ba75c-f749-4694-9e3f-01c23e56e2da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:33Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "268",
                "uid": "c72e693c-33ee-4fbf-93eb-c66afcc78113"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:34Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "269",
                "uid": "72efd1eb-ef83-4240-9bde-23e4b886200d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "kube-system",
                "resourceVersion": "2389",
                "uid": "e391b59c-79ef-4082-ae2e-b2d18662b1c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "kube-system",
                "resourceVersion": "2380",
                "uid": "dac524ae-549b-448c-8040-4e327fdb5fa5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "kube-system",
                "resourceVersion": "2351",
                "uid": "a67b8343-0536-4285-9a07-4807abefbdbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:23Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:leader-election-lock-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "1538",
                "uid": "6d331462-8926-4a22-8a58-c8b9315a4203"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:leader-election-lock-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:55Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "tempo-operator-controller-service-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "28042",
                "uid": "73e1cadd-4801-4dda-9f3d-313752411cdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:kueue-external-admission/alert-mgr-kueue-admission-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:kueue-external-admission/alert-mgr-kueue-admission-leader-election-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"alert-manager-kueue-admission\"},\"name\":\"alert-mgr-kueue-admission-leader-election-rolebinding\",\"namespace\":\"kueue-external-admission\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"alert-mgr-kueue-admission-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"alert-mgr-kueue-admission-controller-manager\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:43:11Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "alert-manager-kueue-admission"
                },
                "name": "alert-mgr-kueue-admission-leader-election-rolebinding",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36473",
                "uid": "7a485c9a-baeb-46ac-a9a6-59f8d3420453"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "alert-mgr-kueue-admission-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alert-mgr-kueue-admission-controller-manager",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:11Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36459",
                "uid": "14416ecf-30fe-416d-80f2-92d3222fb7c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:08Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36376",
                "uid": "c4a129a5-2905-4c16-969f-fa19ee07fbf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:05Z",
                "name": "dedicated-admins-0",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36297",
                "uid": "ccec6ddc-e6e2-4bfe-89e9-51c86ad655d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:04Z",
                "name": "dedicated-admins-1",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36253",
                "uid": "8ac4dd9c-d08f-4241-a122-76074b29133e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:06Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36323",
                "uid": "4f06c2e1-fd06-405f-bc4f-ace3fe64de7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:43:05Z",
                "name": "system:deployers",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36271",
                "uid": "3ff632ac-66d2-4a02-b18f-eb60c5f2b4f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:43:05Z",
                "name": "system:image-builders",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36283",
                "uid": "743069ac-e055-47dd-ae0c-8546f48f8699"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:43:05Z",
                "name": "system:image-pullers",
                "namespace": "kueue-external-admission",
                "resourceVersion": "36284",
                "uid": "81bd6c57-9346-4aa1-a333-7a1b7a383aff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "minio-operator",
                "resourceVersion": "16656",
                "uid": "cecf8778-cf45-4ccf-9f99-cb3e6eaf4e75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "minio-operator",
                "resourceVersion": "16659",
                "uid": "defe3631-83cf-4960-a2c7-aaa4182e040a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "dedicated-admins-0",
                "namespace": "minio-operator",
                "resourceVersion": "16643",
                "uid": "11c7cd0e-9558-471c-a624-51103aa1660f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "dedicated-admins-1",
                "namespace": "minio-operator",
                "resourceVersion": "16657",
                "uid": "a272086f-3bfa-462f-ae8d-48cfd492421d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "minio-operator",
                "resourceVersion": "16658",
                "uid": "0c16c8db-ba8d-4bb6-853f-f4f5535a759d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "system:deployers",
                "namespace": "minio-operator",
                "resourceVersion": "16653",
                "uid": "30debd28-fad6-4f16-bfb2-bac5983e859d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "system:image-builders",
                "namespace": "minio-operator",
                "resourceVersion": "16654",
                "uid": "7037c096-7d31-4cab-805b-059321383ce9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:24Z",
                "name": "system:image-pullers",
                "namespace": "minio-operator",
                "resourceVersion": "16655",
                "uid": "39265ea6-8f7c-416b-a210-cf5c2f77d9dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:27Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "mintmaker",
                "resourceVersion": "26947",
                "uid": "b948d864-8dbf-446b-b93b-5afb6283d883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:34Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "mintmaker",
                "resourceVersion": "27421",
                "uid": "f92b55be-a5f5-44bc-be43-5982af7f544f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:29Z",
                "name": "dedicated-admins-0",
                "namespace": "mintmaker",
                "resourceVersion": "27147",
                "uid": "56da016b-02c9-41ba-bfd1-47c6910f2222"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:26Z",
                "name": "dedicated-admins-1",
                "namespace": "mintmaker",
                "resourceVersion": "26668",
                "uid": "177ee4aa-d798-443e-9e6f-7f960ea03e83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:35Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "mintmaker",
                "resourceVersion": "27451",
                "uid": "b0c9d6d1-2992-4675-8bc0-ff421a89c32b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-admins",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-admins\"},\"name\":\"mintmaker-admins\",\"namespace\":\"mintmaker\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"mintmaker-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-mintmaker-team\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "mintmaker-admins",
                "namespace": "mintmaker",
                "resourceVersion": "26105",
                "uid": "45e83f71-c5e4-4a95-9043-c184baae9199"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "mintmaker-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-mintmaker-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-leader-election-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"mintmaker\"},\"name\":\"mintmaker-leader-election-rolebinding\",\"namespace\":\"mintmaker\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"mintmaker-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mintmaker-controller-manager\",\"namespace\":\"mintmaker\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "mintmaker"
                },
                "name": "mintmaker-leader-election-rolebinding",
                "namespace": "mintmaker",
                "resourceVersion": "26123",
                "uid": "b3e3a5bc-ee24-4fe2-805a-ad44697fc7df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "mintmaker-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mintmaker-controller-manager",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-maintainers\"},\"name\":\"mintmaker-maintainers\",\"namespace\":\"mintmaker\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-mintmaker-team\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "mintmaker-maintainers",
                "namespace": "mintmaker",
                "resourceVersion": "26122",
                "uid": "0bb469e0-b01e-4b0c-a1a2-97d5bd18cc84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-mintmaker-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:mintmaker/mintmaker-manager-rolebinding\"},\"name\":\"mintmaker-manager-rolebinding\",\"namespace\":\"mintmaker\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mintmaker-controller-manager\",\"namespace\":\"mintmaker\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "mintmaker-manager-rolebinding",
                "namespace": "mintmaker",
                "resourceVersion": "26120",
                "uid": "34a95ce0-8c59-4280-a67a-ae57aeb96557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mintmaker-controller-manager",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "system:deployers",
                "namespace": "mintmaker",
                "resourceVersion": "25331",
                "uid": "ecf09dfe-6cea-4a5a-9c6d-5157a7703505"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "system:image-builders",
                "namespace": "mintmaker",
                "resourceVersion": "25329",
                "uid": "a55d5d52-cbfd-4991-af84-b2ffcff2685e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "system:image-pullers",
                "namespace": "mintmaker",
                "resourceVersion": "25330",
                "uid": "30e03da9-b946-425f-9479-cc0d74c1e6c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:multi-platform-controller/debug-pod",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:multi-platform-controller/debug-pod\"},\"name\":\"debug-pod\",\"namespace\":\"multi-platform-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"debug-pod\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-infra\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:42:21Z",
                "name": "debug-pod",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34132",
                "uid": "e0ef8c1d-d184-4101-ab1e-9924fb5066d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "debug-pod"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:22Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34210",
                "uid": "49b85947-9ed7-41ba-8f64-53bfa0482f72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:21Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34105",
                "uid": "7dfe08e0-bbb0-455e-a747-a017f6ad4273"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:24Z",
                "name": "dedicated-admins-0",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34300",
                "uid": "f8063b65-da4a-4d7d-80c6-bb498aedea64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:20Z",
                "name": "dedicated-admins-1",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34067",
                "uid": "e9fd5939-8eb8-4f5e-93a9-7671f3c35cc6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:42:25Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34350",
                "uid": "546a85c7-a679-46a3-9f7e-b380b5d0a88d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:multi-platform-controller/pipeline-anyuid-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:multi-platform-controller/pipeline-anyuid-rolebinding\"},\"labels\":{\"app\":\"multi-platform-controller\"},\"name\":\"pipeline-anyuid-rolebinding\",\"namespace\":\"multi-platform-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipeline-anyuid-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipeline\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:42:21Z",
                "labels": {
                    "app": "multi-platform-controller"
                },
                "name": "pipeline-anyuid-rolebinding",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34133",
                "uid": "b8577773-7e87-4576-a97d-f9320fce4a80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipeline-anyuid-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:42:20Z",
                "name": "system:deployers",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34068",
                "uid": "b79175c9-3001-47e2-b6e5-0fc16a225ebe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:42:20Z",
                "name": "system:image-builders",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34081",
                "uid": "72b2a4b6-7223-4661-8e70-050ccdd177f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:42:20Z",
                "name": "system:image-pullers",
                "namespace": "multi-platform-controller",
                "resourceVersion": "34069",
                "uid": "22be335b-6cd2-4cbd-be99-c438248b88b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "5196",
                "uid": "73deaa2f-abad-4fcb-af8a-1b804035005b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "5206",
                "uid": "90f8e961-bcf2-4781-a677-d6f384366ae6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "5212",
                "uid": "142f529f-a965-453a-aac5-ade54b4f4cb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "5224",
                "uid": "8f2cf002-2473-4f59-8ea7-93fb1dcae33c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "6587",
                "uid": "38d87942-8bdd-4be5-b367-7d428aa072d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:12Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "4287",
                "uid": "14c6d7fc-9eaa-408a-a1a1-0cd507f67044"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:12Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "4289",
                "uid": "65300840-e2cf-4447-b265-6a296a65075a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:12Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8",
                "resourceVersion": "4285",
                "uid": "ff4ba214-51a7-4641-94f2-fa39d5bd66d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-2q77mtaptb8fr7ft4gv4mtfcmmgjj0t8"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5197",
                "uid": "c7ca86d2-8468-459a-ba5b-95fdc47e80f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5202",
                "uid": "69f06da4-b9d8-46cf-83d2-c47aa0f7cf04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5217",
                "uid": "fdc7b5b9-4d5b-47d5-879e-9af50d316784"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5226",
                "uid": "ce0b0c67-9acb-4610-bc7c-0b352f31c91b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6590",
                "uid": "af32eb76-698a-411c-965a-fd57d91d62e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:12Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "4288",
                "uid": "4f19de3f-7f77-470c-b54a-902aa407c64b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:12Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "4286",
                "uid": "9337d7a4-ad96-4dab-aa33-cf394e0df563"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:12Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "4278",
                "uid": "68083e79-636c-48fa-a38d-6e31af40fc10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:11Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-adp",
                "resourceVersion": "20200",
                "uid": "68e9e6a7-3e63-422a-9545-854e9116dbdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:37Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-adp",
                "resourceVersion": "22617",
                "uid": "60be3951-fa95-44f1-a3e9-42dd3b9bf2e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-adp",
                "resourceVersion": "19865",
                "uid": "06b99a8a-a32f-432d-aa96-590f3f617482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-adp",
                "resourceVersion": "19654",
                "uid": "c23bfe36-a857-4a3f-8936-67628333c9bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-adp",
                "resourceVersion": "21952",
                "uid": "7076cc06-c89b-4916-81ff-963c801a62fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-adp",
                "resourceVersion": "22692",
                "uid": "9426cd4d-154e-409b-a055-d63acee91898"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-adp",
                "resourceVersion": "21582",
                "uid": "1322de5f-f5d6-4e5e-9f39-7f1ec08626a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:19Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-adp",
                "resourceVersion": "20984",
                "uid": "636b30f4-544f-4666-9552-6c3fa6753736"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:12Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-adp",
                "resourceVersion": "20307",
                "uid": "4eac6424-13a3-4e4d-8dc4-99de1ca14cf4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:41Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-adp",
                "resourceVersion": "23082",
                "uid": "f2f4dd73-d1d1-474a-9c57-9738289bf5d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:21Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-adp",
                "resourceVersion": "21138",
                "uid": "db189404-46b1-4413-9853-5c2c9882e6c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-adp",
                "resourceVersion": "20664",
                "uid": "f1bddd29-bc38-44d5-b161-e8211f497f36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-adp",
                "resourceVersion": "21837",
                "uid": "d321e2fd-ff58-4a2f-9302-79e2dbbe34ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:41:11Z",
                "name": "oadp-minio-storage-binding",
                "namespace": "openshift-adp",
                "resourceVersion": "31403",
                "uid": "1c45ef5e-510e-4e2b-847f-eec2bc448a1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "oadp-minio-storage-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "oadp-minio-storage-sa",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:20Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "oadp-operator.v1.4.9",
                "namespace": "openshift-adp",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "oadp-operator.v1.4.9",
                        "uid": "f87eec89-a609-4712-8a50-2d2e646c4e20"
                    }
                ],
                "resourceVersion": "21045",
                "uid": "f2480a98-aeb5-4ecb-9dc8-27dd7585a37c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "oadp-operator.v1.4.9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-adp-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "velero"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-adp-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:23Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "oadp-operator.v1.4.9",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-adp",
                    "olm.permissions.hash": "8ga0lfpLgir4nqRFijCsxZPwvstMS95nRaCtBu",
                    "operators.coreos.com/redhat-oadp-operator.openshift-adp": ""
                },
                "name": "oadp-operator.v1.4.9-ope-arogFylqwEdcfHAIBvyZHZTwLv8oJ7hzbNz77N",
                "namespace": "openshift-adp",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "oadp-operator.v1.4.9",
                        "uid": "b0b53c34-d35a-4b56-ba01-6a6beb98d091"
                    }
                ],
                "resourceVersion": "23138",
                "uid": "6a2d5082-dede-4f9d-9f3c-75dbd884d164"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "oadp-operator.v1.4.9-ope-arogFylqwEdcfHAIBvyZHZTwLv8oJ7hzbNz77N"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-adp-controller-manager",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:deployers",
                "namespace": "openshift-adp",
                "resourceVersion": "19539",
                "uid": "eff29a68-be1c-43d3-882d-5a3c310c0570"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-adp",
                "resourceVersion": "19553",
                "uid": "b69c11a6-5bcd-4d6b-80fc-f7949668bcc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-adp",
                "resourceVersion": "19538",
                "uid": "5dd0ad6f-dbe7-46a1-aca8-2ac8fd1f43ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6489",
                "uid": "dd9a54a8-7bd9-45bc-b3bc-65fcd4c4d136"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6737",
                "uid": "64655f1a-ee76-434d-914c-33d5e120999f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5294",
                "uid": "04e7ef0b-43d8-4b36-ab78-83f87045aa95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6619",
                "uid": "d60eeb88-e1f4-40db-be44-74d1cf9a8210"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6075",
                "uid": "d28bc22a-224a-4e52-a498-1c772138f470"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5895",
                "uid": "f12d7ba1-a439-4a35-8e9c-5bd9bfa35784"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6668",
                "uid": "e5938a72-51e5-47e0-b357-385b18e8412f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5884",
                "uid": "f8b4a4c8-b9cf-4121-812e-84d4882ae7ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5398",
                "uid": "1f722363-f9e5-4530-8d54-989040d6952c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5440",
                "uid": "26643435-cf99-4064-8fc3-ccdc5d641c2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6067",
                "uid": "7114cab2-a14f-4e5c-a567-aa8a7cd77f43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6180",
                "uid": "fec1da75-6e48-4715-9c79-5ab8521af983"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5194",
                "uid": "a75af98c-e869-4063-9f49-64e4b58a4a1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "830",
                "uid": "74b276dc-e59f-43db-8658-c045723893bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "2494",
                "uid": "a86d97b9-35c3-4a1c-b3ad-5abc6b30ad02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "2451",
                "uid": "fa409746-7b24-4e01-ad35-d77c97ecef63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "2491",
                "uid": "9afe2e59-63f8-49f6-9b63-da1ccaac48fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6436",
                "uid": "f9705ce3-fa07-468b-a422-d19be415ae1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6786",
                "uid": "9a1e4b66-04c2-4111-9a08-8cd145ab2e3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5284",
                "uid": "e1a672eb-b8c6-40be-b7dd-27a21ad4c9c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6579",
                "uid": "3f9d6cd2-abf5-4258-ab6a-3002cc4029f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5981",
                "uid": "8920fde9-9e8b-48c0-9042-54d40c90c6c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5947",
                "uid": "983f0eb4-b4ba-449f-adee-e43431c39959"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6756",
                "uid": "11630efa-e426-47da-9949-df29adc41e5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5921",
                "uid": "209e8cf3-d52d-4086-9612-e758c055a469"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5455",
                "uid": "a8bb2fb4-4bb1-45e5-a07a-bf6d30535727"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5561",
                "uid": "d88161b9-238b-4972-8136-2d553c9623aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6043",
                "uid": "d1052dc1-1d46-4505-9037-c0abbf838831"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6303",
                "uid": "fdc60b52-1bd9-4f78-898c-ab8eb3ea7522"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5289",
                "uid": "8fcb8aff-ec8b-47c6-9843-d2d0dfd332b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1765",
                "uid": "ecdada76-2392-4ec8-9422-1a8b50a1d20a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "2488",
                "uid": "c360246f-0bc9-4859-b21e-d0ae5be2ee34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver",
                "resourceVersion": "2417",
                "uid": "a88e054a-633c-4129-96e9-05fbe59a6251"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "2487",
                "uid": "e2d8c384-a634-452e-af17-119d5941ce83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6304",
                "uid": "b74f9845-b097-4a44-8eff-4fa8f7e57dc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6679",
                "uid": "f57c9e74-4b1f-4f0c-b396-9aff8c9256df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5373",
                "uid": "edb67b52-84d7-49b1-9285-86cf4a0b171a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6503",
                "uid": "f11cd87c-372c-4342-af33-407139b2e122"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6045",
                "uid": "ad2c4b24-4036-4480-85a7-693b507ac332"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5924",
                "uid": "83e11533-78ec-42b4-bfb6-27caf55c0eff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6657",
                "uid": "a5cf1aa4-7315-46d4-ac67-d7d520ea756d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5896",
                "uid": "5350bb0f-4ce3-43de-bdd3-71330e8f3cf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5393",
                "uid": "220fd47e-17ad-4a46-82d3-9c2628e3a2f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5644",
                "uid": "9acedd3d-58f3-465e-91d2-751f5699120c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6072",
                "uid": "81f70da7-5017-438d-ad3e-e1d9b50e1cb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6184",
                "uid": "4a6116a8-4ab4-4994-801d-68916f111aeb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5249",
                "uid": "3f654de6-c8c3-4442-ad95-65af14882fb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:43Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "3631",
                "uid": "d2f91c25-63e0-4c38-ae09-3c6da591e6f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "2523",
                "uid": "87866d05-712f-4220-9ae9-229cf8828943"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "2492",
                "uid": "af5133d9-9301-4924-af30-2b31c141d223"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "2493",
                "uid": "8c00510b-9ba6-4ac7-8abc-8a2cc0a4ef2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6469",
                "uid": "b1fceecb-69d9-484a-8390-2191209854e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6677",
                "uid": "dd18c011-4eba-43de-906f-6bba8d0acb84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5308",
                "uid": "cf523bbf-c9b5-485e-81f6-d7cdb9eb2ff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6591",
                "uid": "f4e9e9d0-a0ec-4b92-9bed-e1e6d80cbde7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6053",
                "uid": "4688dab6-c946-4986-9ca3-a35d7674f6ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5807",
                "uid": "3b0c4810-aceb-45d1-a302-6500d1ae20a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6671",
                "uid": "e804427b-4bb0-476f-a4cc-6ccc70c3bd2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5795",
                "uid": "7c00e1e1-c2d1-4185-9155-9671555ac866"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5405",
                "uid": "95113bb2-dad1-455d-82ea-d7b14f769d9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5627",
                "uid": "dc984863-15bd-4378-a1a0-569e1256d0fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6103",
                "uid": "e06ad3d4-ea2b-4463-b45c-8470924d4e40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "6309",
                "uid": "c99b7255-b3a0-4174-8e44-cbdc563e2c64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5263",
                "uid": "cd3e0b96-894f-4528-8ee0-b2dd2d3aa8d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:45Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "3667",
                "uid": "c3c37d6e-d7fb-4822-9925-1a8f2983ab97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication",
                "resourceVersion": "2497",
                "uid": "be21d70f-315e-4466-ada7-760cb5ee41a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication",
                "resourceVersion": "2495",
                "uid": "b1270b8f-709c-4d4b-af31-70b89b34c36a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication",
                "resourceVersion": "2486",
                "uid": "96bc372a-6d69-46a2-b423-1e36ac27e994"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6276",
                "uid": "6ae93a34-1fec-493a-89a4-79f0f4b8f9b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6681",
                "uid": "9f089248-8d45-4667-b87d-269f0d9534e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:32Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6877",
                "uid": "1696c2e6-502a-46c9-a757-e8b9b0f418df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6580",
                "uid": "4c883d4a-8b09-44f6-aad6-9d268904cf47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5969",
                "uid": "2cc2d64e-7272-40c1-b630-df0731c03ee4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5914",
                "uid": "1bae95a1-ccbe-4787-9995-ba270c9e609d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6731",
                "uid": "9f2f88a2-16bd-42c6-848d-3bdf31363dd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5811",
                "uid": "977ddae4-c766-4e4f-b01a-b5e15486e799"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:34Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6898",
                "uid": "c2870ba7-0cf4-4100-bba8-907f58104702"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:37Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6913",
                "uid": "b8925ee2-dd5b-47d6-9bb9-ce36c2a347f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6108",
                "uid": "6d671b08-e0ee-49e7-bd73-6984100f6c70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6282",
                "uid": "7b4a1814-be56-4f13-80d5-a953756f5a7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6840",
                "uid": "64558c4e-8862-49b3-bb61-53d3e4e91dcb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:34Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6893",
                "uid": "6390968b-04d2-4848-a035-19c9e868dc38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5626",
                "uid": "aecdfbfd-03bc-4b3d-813f-b78016823786"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5625",
                "uid": "ea03fd54-ba63-45f2-bcb4-0fa9256ffd99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5629",
                "uid": "4918586e-e2cf-4bea-81cd-45ca51c2a646"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6363",
                "uid": "f23b0a8d-bec9-4290-9ff0-0332bd609468"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6824",
                "uid": "deedf393-722a-498d-b69c-0f6428867a56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:32Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6872",
                "uid": "3af8459f-eae4-473a-a230-23391354a1cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6432",
                "uid": "0931b3b9-13b6-43ae-9b6e-dee3e7637a26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5983",
                "uid": "43e512b7-fecc-4472-954e-dada9d0591a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5826",
                "uid": "7cd21ef8-109f-4b28-aa2a-06248fe8f6de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6620",
                "uid": "a0a4fb29-43e6-4693-a758-e7a50dc27ed3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5958",
                "uid": "051acb3b-6f02-4305-8d58-79d835fdceb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:31Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6863",
                "uid": "8fd9b4de-3942-4c7e-ae49-0e5766b855f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:37Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6910",
                "uid": "8f61e4d9-6dd2-4a20-ac15-edb34b007770"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6022",
                "uid": "1d4b3d1f-268d-4d0f-b1c5-ac78a838d92e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6168",
                "uid": "5dc4e1f8-e5e9-46e1-afca-8b20045231a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6849",
                "uid": "ec364d17-3ca3-4ef3-b15e-c692dc9e27a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6884",
                "uid": "f1763311-6084-47e2-82e5-948df9c19932"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5729",
                "uid": "f65d3f88-3385-4bac-ae0a-0577896ea15f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5730",
                "uid": "b68cd986-4f54-4679-8734-a1344345d277"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5726",
                "uid": "ffe3bbec-529c-43e2-96f1-a72677f8a6cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6337",
                "uid": "eeb9a472-47fd-4e41-ab4b-e9cc44529e7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6723",
                "uid": "dc9ca083-de00-456e-b8aa-7095b9720f7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5392",
                "uid": "a50d048c-1067-4aea-bcda-8b24feb2cf1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6486",
                "uid": "ba1c924a-c067-4525-b7c3-d6e0bf85aa65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6105",
                "uid": "4e46757a-ed05-472e-bab8-c3ad81b05248"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5939",
                "uid": "9455cb21-b713-4df1-afd2-09de75f71640"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6776",
                "uid": "a14ca035-b19a-4e9e-8e49-34fb95d81a89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5845",
                "uid": "c2177909-ca73-4721-9715-396592e1ff52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5338",
                "uid": "82c58388-dbad-462d-82d1-77022736c6f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5652",
                "uid": "738d3ef4-12c6-441e-9f52-281d1c024793"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6135",
                "uid": "524acb99-f779-4cd5-9474-81baf3cb3772"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6327",
                "uid": "56ecc528-d72f-4dd6-aeed-2f181f7a7b44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5198",
                "uid": "cea19f2a-5af8-45aa-8bcc-be443e22ac60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5501",
                "uid": "d84895c1-d252-4201-9b9e-09aae7da89bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5107",
                "uid": "78700d1a-9053-48b0-9364-6f687036fdd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5110",
                "uid": "c458528f-d0aa-4a6e-8970-e443e470c464"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5104",
                "uid": "41e1a522-2b39-40fc-9478-894096782619"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6339",
                "uid": "3b0d357d-0939-48b1-9e0f-577954090d66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6682",
                "uid": "6201613e-f684-49d6-86f6-151213ba480d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:32Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6873",
                "uid": "309e2a6f-d4b6-4821-9d86-5831dbc31c0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6543",
                "uid": "27a4c174-7fdb-4399-8200-9937aaadc8e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6031",
                "uid": "ab420d38-d867-4fc7-85d8-56702b4093dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5909",
                "uid": "bc0a0cd0-82b8-4fec-a93c-4ce2878a6e9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6664",
                "uid": "38eaaf18-5b11-46ed-af70-7d9c9e0ca578"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5923",
                "uid": "ee0fd263-7478-428e-b6c7-2fb170e58a93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6889",
                "uid": "1f64940a-7c11-403c-adbd-4c07c2cac0bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:38Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6920",
                "uid": "a2ab68ef-2772-45db-a6c7-b41b1cc6f058"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6166",
                "uid": "13de5f4f-8547-4052-8c4f-58d96bd1da7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6302",
                "uid": "b1c7363f-986c-4491-8f1d-bd436c036c84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6833",
                "uid": "559b04fb-b2da-4e9d-b051-a10a3b5a8718"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:34Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6895",
                "uid": "8c6f556d-249d-4976-82aa-ae388047e88c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5761",
                "uid": "54349c92-652f-414e-8bc6-1e2e61c73df7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5758",
                "uid": "94e84379-9791-4022-967a-ab0692f52326"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5757",
                "uid": "9b8d0863-cfe3-4843-a78a-f4998b8719bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6382",
                "uid": "b8b7c1bb-bda1-4f5b-94c8-1b1eb981da45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6656",
                "uid": "0046ddc4-a003-4bf8-bfde-75c0a22c022f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6862",
                "uid": "d8195b95-f538-4196-bcf0-e02d2a726a84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6545",
                "uid": "1092f3be-0f5b-45d9-bdc2-74f2f3835f5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6092",
                "uid": "8f1c8dc0-3929-4292-8149-730d0e934985"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5828",
                "uid": "77ba1329-2035-47b3-bc15-e40820ceb0d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6604",
                "uid": "b9794ac8-a502-4576-b46d-928a6ee8887d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5850",
                "uid": "dc01a20d-a361-4489-80f5-771ee8c770cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:36Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6903",
                "uid": "a8416178-ec15-4683-a138-31e6db797670"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:40Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6938",
                "uid": "ace03de6-2559-4b77-9043-a5f6a7cd443f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5977",
                "uid": "0860cd53-ec9a-4eb6-ae66-4307348db97f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6145",
                "uid": "f8addb8a-71ce-4279-a5b7-7bbcb01d6145"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6843",
                "uid": "ca3bd1ca-57f2-42cf-ba7c-3be4ef208d80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6886",
                "uid": "981a3a5a-5756-4738-85c6-f816cee621ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5649",
                "uid": "53c0f8fe-f603-4ce0-bea6-d676a5f547de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5650",
                "uid": "084daf5d-8bc2-4d5d-bbcc-894d6e155f44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5648",
                "uid": "cc36f87c-3e4a-4fae-ade9-161226f89b34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6344",
                "uid": "9e104c42-330b-437f-8582-37b55734907c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6797",
                "uid": "676ac690-77a8-4cd3-bf4c-b259885f17a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "backplane-cee-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5762",
                "uid": "8e2d031f-b1bf-4dcc-8e2b-131fc2bc346c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5376",
                "uid": "ce067a2e-ba61-42e3-9327-7eab5ec49e04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6488",
                "uid": "33a77778-bc9a-436b-8844-a6b169d77c6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-csm-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5774",
                "uid": "0375990d-a867-4703-a275-f3290dda8b7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6006",
                "uid": "d148177a-4a37-434b-9064-6c71a062013e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5881",
                "uid": "0b6a00b8-92c7-43a2-9ab0-2dde7d132537"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6606",
                "uid": "87b295c4-9fb7-46b0-8664-5b013555823f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-mcs-tier-two-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6550",
                "uid": "e323a168-b0a7-40e5-b464-67ca112fdc58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5852",
                "uid": "e62506a0-9fa1-4891-91a0-f23f7bb89f9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-mobb-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5554",
                "uid": "3c068c6d-c8a8-464d-acd4-0fe151c02f58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5372",
                "uid": "699b294e-b3da-465d-b1d4-f4c144fdfd9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5535",
                "uid": "e72b0b0c-ec99-4a05-b635-152d0b5f3c57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5604",
                "uid": "6af47043-6edc-4bee-a684-abeadd1aa306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5996",
                "uid": "09c26de1-2d8e-439f-ac8f-917971b5228b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6311",
                "uid": "4a901c86-65b7-4eb7-9877-5b7d9aad85c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6835",
                "uid": "a5d66bd2-61b5-4401-b613-b8f4e49a5ad2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:47Z",
                "name": "backplane-tam-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6973",
                "uid": "4190b30b-12a7-46d5-a3f7-6be2d947632d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "osd-delete-backplane-script-resources",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5708",
                "uid": "5993a7c3-381d-4ccc-8aa4-9881f76fa7de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5505",
                "uid": "982b1eed-198f-43cd-a0bb-ab38adcee642"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5150",
                "uid": "0fab2ec1-2781-4983-842a-1292c60358b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5146",
                "uid": "45744564-ad3a-494c-ae6f-c6f84b5c7960"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5151",
                "uid": "ed52c519-9f06-459a-a685-6e64f9b54aca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:53Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "7040",
                "uid": "049c8bcf-f610-424f-a892-553015be42f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6789",
                "uid": "4486b77c-8037-40c5-9c8a-af3cfa04a9cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6851",
                "uid": "89dfcf5a-f3cb-4ab1-969a-ce0884ba58d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:53Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "7046",
                "uid": "1fafd642-42c8-421a-9fc4-a16e825458a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:43Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6952",
                "uid": "c28ed4e8-eed3-46e7-90a5-729d2272945c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6925",
                "uid": "a42607a8-b165-467d-8446-73116ebc5a7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6621",
                "uid": "cb6992ed-a297-49ce-af66-e5770e5a8e28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6962",
                "uid": "c4c14ef1-78b1-4ba9-8e75-1c2cfda81738"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:30Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6860",
                "uid": "1da599e2-0291-48bf-afca-70223dbf4f92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:36Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6906",
                "uid": "2f26e999-86d5-4153-8bc9-5f72734408f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "7004",
                "uid": "8569af8d-ecc6-4fc9-8a07-1f7b531dbda8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "7001",
                "uid": "49a804af-3e37-4b10-8951-7eed167d00b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6825",
                "uid": "eb56456b-9702-456e-a7ca-0bb6059ea1d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6882",
                "uid": "5e62fc91-4c93-40be-b59e-1a58bb3a6b39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6529",
                "uid": "797f1db3-4fb2-4603-baad-d79ece7b8490"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6532",
                "uid": "d7150906-7468-4e61-b11e-15ec0b7e4b15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6528",
                "uid": "11f771a4-6bec-49d0-aaec-2fe1fc737352"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6384",
                "uid": "ebd44cc6-beb3-4548-8005-12cdb002253c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6658",
                "uid": "017f3bdf-39aa-44c7-9e54-543cbac5e4f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6853",
                "uid": "ee0ee139-b7b3-4514-bbf1-aa4b97c8a26e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6461",
                "uid": "4faae3fb-f076-4ba0-87ff-b2aac8065503"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6055",
                "uid": "73478d26-ca24-4f8c-893b-75927fd29c53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5857",
                "uid": "9d70f10b-abe8-4a26-b061-4c90c2272b6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6647",
                "uid": "d0cc91f7-154b-4c24-ac11-6d49a05f1faf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5797",
                "uid": "8939feb9-691c-4393-be6c-be9c86075668"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:32Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6875",
                "uid": "5dd3f204-28aa-46e3-8fae-3b2a92c3f3ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:39Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6927",
                "uid": "4f66dee9-0f96-4c84-8d41-50c6bb22736b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6011",
                "uid": "a22020b5-f5c5-423a-a522-a9bb3ee63944"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6345",
                "uid": "1babd752-e603-4626-9332-7d1907e79103"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6799",
                "uid": "04a52a25-877e-43b4-99c8-64f5c4670bb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6887",
                "uid": "a0b2bb0a-b564-4238-b3a5-4e96f8fc456e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5539",
                "uid": "4f5c7479-b87f-4efa-9d12-633e98b1d151"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5541",
                "uid": "79ac8c0d-ae4b-4cf5-bc2d-d566edb4ad86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5538",
                "uid": "f1f5e985-2fd6-4a81-9c4f-564c89866b6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6289",
                "uid": "268c55f2-90b9-4126-a85b-b9fdccb89de8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6730",
                "uid": "c853c886-7eb3-4f25-a5bd-9d68067a5419"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:29Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6855",
                "uid": "80d74fda-7833-4125-a788-1ebc7ec54f80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6592",
                "uid": "3d07273e-ce6d-4cb2-9b1a-f49e2e47dd4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6033",
                "uid": "e7f65d94-4cc5-471c-99db-285d116883c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5952",
                "uid": "bffa3d72-7430-4202-8759-26a9ff2c4839"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6631",
                "uid": "e10d3ea3-5b74-4f32-80fd-3396dd16a2b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5872",
                "uid": "d894d3bf-14b7-4b32-83d8-88b56a323719"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6883",
                "uid": "7979e2e5-9056-472b-820e-1e56f4bf14ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:36Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6904",
                "uid": "7bd2fc4e-1001-4101-aeef-f015a63301c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6115",
                "uid": "554d0585-53c1-4a58-b221-1c02c2840892"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6199",
                "uid": "3f4bb474-24d3-4fad-8e91-da5162c9ec37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6846",
                "uid": "f03ddb8f-4205-4124-925c-66551d2a578a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:34Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6891",
                "uid": "f2bf5eed-7cb4-4245-8a04-e349fbf658df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:35Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5688",
                "uid": "010c68d9-e82e-4329-993c-29fcc263c29e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5689",
                "uid": "f53032f3-510d-46ef-a9c9-8832badb6cfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5687",
                "uid": "a21c3585-79a8-4bb3-8c99-d77669f35d71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6452",
                "uid": "c53f5cb9-d623-4fa2-a491-2ff7cff275fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6798",
                "uid": "9e6b060d-b1e0-4564-ba56-e44ca1fed73c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6832",
                "uid": "3ca845bf-d1f8-42d5-9a50-0e018a6870cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6451",
                "uid": "7c545417-688d-49b1-9297-c87d87e79046"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6010",
                "uid": "156a3760-8063-48bc-a239-5e8564466b41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5859",
                "uid": "ea30f218-970b-4f06-a9c7-e0120fb2947e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6738",
                "uid": "4984466d-a1c3-41ca-a20a-c91606d329c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5959",
                "uid": "c5f82c25-d2e0-4848-b08b-62804f2b9376"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:31Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6866",
                "uid": "e0587342-df16-49ab-be50-de71e9f0fc7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:36Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6908",
                "uid": "a4d4dcfa-1be9-46d5-adb1-331ac7a3c91f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6046",
                "uid": "e35d3a8b-4a7d-46eb-a4bb-3088789a86ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6284",
                "uid": "f7ff6f26-9189-43b1-8814-dafe0177b379"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6837",
                "uid": "f56ff1dc-06a5-43bc-9a1a-990586cf0377"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6888",
                "uid": "1f639982-e1d1-499f-bfca-9ff3d10bf827"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5582",
                "uid": "444aa5ed-292b-47bf-9c22-4660491ee730"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5583",
                "uid": "941f181b-90a2-4fdc-94cc-dd2d484895aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5581",
                "uid": "4b2a7f6d-e428-4078-8a61-557b7ada0bc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6454",
                "uid": "e797191b-a6f1-4547-9b8d-7e804768b512"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6709",
                "uid": "077dfb1b-9027-4b7d-89dc-be2269eadc98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5410",
                "uid": "f98df196-a0c6-422f-96e1-9ab1c4cca920"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6505",
                "uid": "eedf7017-e210-4d5f-b92f-8f0a556676fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6015",
                "uid": "dbe106fc-5236-4bcd-bbe6-186a4fe21842"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5871",
                "uid": "892eab28-985d-458f-9903-05ad41a60082"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6693",
                "uid": "7f7bf4bf-19b5-44e0-82b2-5772cd1ef428"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5874",
                "uid": "841b43d4-8834-4f8a-9496-40afefe10021"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5420",
                "uid": "eba4cd9c-8396-4edc-b16a-aa653571194f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5591",
                "uid": "71fdefce-e310-4067-a114-ef730559a9b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6012",
                "uid": "e516c437-b6c1-47d4-9d3b-a9494fcef68b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6373",
                "uid": "5ef9e283-90a3-4ff9-8cfa-e7b4dee3586b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5272",
                "uid": "b48b9655-2228-4cbd-8838-36e71a073ff6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5497",
                "uid": "83010e1d-b462-4ef9-9333-042095b03093"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5108",
                "uid": "38511061-0c15-4f19-b706-349249e9ba69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5106",
                "uid": "7fad838d-b864-456a-a472-5b6021f8930d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5103",
                "uid": "8f7114c9-96aa-4daf-88c9-2455c68348bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6335",
                "uid": "53634938-0cdc-4473-9d7f-fe64490a326c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6817",
                "uid": "037e626e-19ed-4ffc-836d-1ad03dbb0e5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5329",
                "uid": "9fd1aad0-ffdc-4188-9664-fe809b3dca83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6484",
                "uid": "8cc2ed3a-b2bc-4f23-a60a-9aa91ced5323"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6068",
                "uid": "d0af234f-aaef-4173-a138-ac220da96942"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "5951",
                "uid": "9cfd8d6f-c33e-4767-9781-ab775cae6397"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6618",
                "uid": "eff80918-02d2-40b9-b0e2-57eb273890d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5788",
                "uid": "368271f0-55ae-476d-823b-725dd65d2695"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5355",
                "uid": "1a066dc4-369e-4bbd-a8ab-423b533791ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "5488",
                "uid": "7e21fbc6-a5a6-4f2c-a985-9a3036df5da8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5992",
                "uid": "e3000603-d88c-4f84-bc2a-a868dd3e76a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6362",
                "uid": "1d463e31-048a-42b3-8e78-c79b4aef4444"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6815",
                "uid": "d9dd87d1-06ec-40b8-ac3e-66ccf001bc23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5180",
                "uid": "dd1a816a-a11b-4601-aade-c8219cbeb813"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane",
                "resourceVersion": "5186",
                "uid": "fd995ca7-3d66-42ed-97b3-3fcfbcfec05c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5179",
                "uid": "224a5838-c74f-433d-9672-485b97c6257a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6307",
                "uid": "2b11df6a-ed69-4934-a9f3-1d2ea49aecd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6739",
                "uid": "0baf856b-1c9d-45e9-8ca5-f4f1be1995fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5354",
                "uid": "038ecbfa-e37b-4729-b92f-01e10c273b79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6622",
                "uid": "b9204e5a-87f0-4215-9baa-29f2a9a6cb9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6107",
                "uid": "98ce227f-fd1f-4b39-a606-7da27b02a84f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5810",
                "uid": "2e14fd1d-1ab2-4298-abc3-b3613d6def92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6683",
                "uid": "2d24e777-afb8-4587-8527-dc78f97e0a85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5799",
                "uid": "dc3d72ec-e531-4667-bb1d-4512e617eeae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5394",
                "uid": "e8e9159d-d106-4dc3-8817-2d28ed8a4b8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5445",
                "uid": "8fb4bca6-7b8d-4d50-b70b-ad50faa5e5cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6149",
                "uid": "6cb58167-d7df-4d59-9248-385b938c6538"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6313",
                "uid": "0307ba52-3a47-4c3a-b7cf-2e2bef6e9166"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5252",
                "uid": "b2c10f88-ebbc-4376-90cb-d1df625bea51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "2496",
                "uid": "919f1130-3116-48e7-aec6-372b6f4e1355"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "2489",
                "uid": "e8739deb-e13c-4cb3-b076-215f5dec8f66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "2490",
                "uid": "606ede37-62cd-4908-bbe2-df911c779da2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6385",
                "uid": "802257dc-405a-48b6-b8bd-7155a7fc0d61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6663",
                "uid": "d74a1add-5682-43ec-b476-d731d5b44f5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5365",
                "uid": "2978e2c2-94ba-4ed7-b8ee-77021d325607"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6536",
                "uid": "7205b6d5-7880-406e-a98a-612c5a3d4ed0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6114",
                "uid": "a7ce7f7b-af94-44ea-ad8f-285aa293606d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5839",
                "uid": "077a94c0-124d-4c42-8593-24a0081f2679"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6714",
                "uid": "d54207b5-6a7e-4003-aa4f-982a802036ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5816",
                "uid": "3674cda7-917c-40e7-a479-b327aae80129"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5384",
                "uid": "a41b956e-4dd0-42df-823d-9e701fc218d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5540",
                "uid": "dea99915-0773-4f6e-a530-ac6c2f03973b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5999",
                "uid": "18227feb-54c3-4cca-9d76-4e7d3588406c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6332",
                "uid": "e998ae79-5864-4caf-b766-008f24826027"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5275",
                "uid": "9bcb85a9-31de-45fc-94c6-da6d20cc7303"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:13Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1076",
                "uid": "ddce7edf-d1b8-4edc-a5a0-fc12c9bda0b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "708",
                "uid": "613c8982-9e4a-45aa-abbb-05235dea4aed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "2642",
                "uid": "36d8ddc4-c02b-4b7d-a1dd-140563285c73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "2566",
                "uid": "18440ea4-6a08-452d-a941-a25b6cd74aa6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "2644",
                "uid": "151fdbde-729e-4141-b2e7-9f8d9244916c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6456",
                "uid": "24487121-b908-4fc9-97f6-08f61b644b79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6801",
                "uid": "d9fbf502-7868-4042-ab43-84489cf6c589"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5311",
                "uid": "f0b12bce-95c1-4215-86d3-d37f96535fa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6600",
                "uid": "0f5b96a2-2958-4352-ba8a-58af03df4b61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6132",
                "uid": "bc6c6272-e0ec-482f-ba1e-14ee66b218bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5812",
                "uid": "f7e334d1-9abd-4c28-a090-a05b62c57853"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6718",
                "uid": "81c9cd32-01d1-41d9-a220-62e15e3d8ed2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5961",
                "uid": "9c49fe3a-a0e7-41e2-91d3-f403696ff982"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5340",
                "uid": "b000a191-33bf-4724-a683-6cfe019a15ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5500",
                "uid": "a624d8e9-9fda-4b54-b320-4807aa633469"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6127",
                "uid": "bcee96a6-cd22-4fd2-867b-cb6220a0110e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6286",
                "uid": "baf62beb-279f-4927-953e-f24f76bda34c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5147",
                "uid": "0b51cef7-55d9-4564-a0b5-64e225c07648"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "cloud-network-config-controller-rb",
                "namespace": "openshift-cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "2878",
                "uid": "c34a5d3a-c35c-4fe6-9c75-6890e3fbfc7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "2649",
                "uid": "f1c7bc99-04df-4b99-aabd-241c2eb04c78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "2600",
                "uid": "3ab35724-2bfc-4cf1-bcc4-a89a2ae5c6c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "2643",
                "uid": "e5234de8-34d6-487e-8dbe-9fae9303313e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "aws-ebs-csi-driver-lease-leader-election",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1726",
                "uid": "e683c3b6-acfc-4684-9086-49b14bfb6e1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-lease-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:21Z",
                "name": "aws-ebs-csi-driver-operator-rolebinding",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1406",
                "uid": "a764eeac-29ae-466e-8dd0-32a96be9c515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6346",
                "uid": "22b0b80d-3b07-49b3-857e-81f071f83566"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6669",
                "uid": "276088e7-012b-41a9-b13f-1d0ab009cfb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5378",
                "uid": "785dd53a-e5a9-4a08-83a2-4fdaf156645d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6508",
                "uid": "0a69b793-e326-483e-abb0-83390694ac55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6024",
                "uid": "96a4cfeb-c3e6-49ea-bc9c-7c33b2568bdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5954",
                "uid": "cbc982b8-6280-4484-bfca-806cb4065f15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6777",
                "uid": "c9bb75bc-7351-4f64-9e32-e3665691c029"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5965",
                "uid": "6908f3d6-a71e-4b11-8d3d-20511bcb2306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5407",
                "uid": "e985ebb6-4caf-401e-8f97-1734187aa0d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5449",
                "uid": "c5bcc066-c9c7-4e6f-a944-835c02c36498"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6151",
                "uid": "05a15d9e-8511-45d3-b81b-e65e2b6dc9b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6186",
                "uid": "ce137356-0812-4c28-bd1e-df4f592eb314"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5276",
                "uid": "1243bcd5-ce90-4710-9f72-2b64af0988ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2646",
                "uid": "9c95112a-435b-4dc4-bbf4-9d064294e78d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2647",
                "uid": "5aeb7e83-5666-4057-8df6-17549b968cd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2648",
                "uid": "3cb02d08-e4a2-4ea9-910e-82683356818b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6278",
                "uid": "87f8fc6a-38d7-4514-b601-ae7149005c0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6819",
                "uid": "d6a53f1d-2642-4234-8b63-3f8c37fb063d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5333",
                "uid": "18b7928a-522c-4b39-8903-b16ff54b4532"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6467",
                "uid": "f15ced5d-cab3-4ed4-8357-aa97fd9666ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6076",
                "uid": "3ce00046-a58b-4b57-8b8c-fc7c5e8891cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5916",
                "uid": "360cc34e-9bf1-4fe5-9643-a09c6dd3c6ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6759",
                "uid": "928d40f6-78b7-45c4-9007-b5c19b6da766"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5900",
                "uid": "65bf957e-73de-4933-ba87-e0c9d2dba6a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5327",
                "uid": "e146644f-3172-4889-89be-9ed469fb6cd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5549",
                "uid": "643e3340-20f8-4f36-8be9-0e4771457a59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6160",
                "uid": "17fab9ef-1b62-4249-b986-37ed559ee30f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6375",
                "uid": "793a36e7-be2b-47e8-bb29-b9213e7e904a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5203",
                "uid": "1b15e118-dddc-4995-9dad-f693d74187d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:08Z",
                "name": "machine-approver",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "912",
                "uid": "9156b990-e112-4dc1-9eaa-571010214571"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "703",
                "uid": "abf43abc-d8fa-41fc-ab33-cae4be99c425"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "2639",
                "uid": "7d03f442-4cb1-4ea6-94c7-790f8af69cea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "2638",
                "uid": "8114833a-2742-4a4e-97a7-c29a58b851f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "2640",
                "uid": "142d2c03-1c8f-4369-ab2c-5ef4034fe27f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6459",
                "uid": "c8fd2b82-841c-42da-abd3-4980e129119c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6694",
                "uid": "d2118105-cebb-4119-8a50-5bb6b3d9ec79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5320",
                "uid": "38629161-d106-4064-a861-70258d6083b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6589",
                "uid": "ea72ee84-af27-446b-bdba-5e36fc522948"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6116",
                "uid": "ece9ac07-8466-40f0-97e9-bd8374bfed9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5841",
                "uid": "76501aff-39f9-40dd-abd4-4af1545ee7e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6740",
                "uid": "b229b2de-d04e-4115-b262-e7353ca37bdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5835",
                "uid": "89c07864-272b-4a29-aa60-876ba9b75b67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5343",
                "uid": "d103fa27-0f65-4834-8683-eb239c5f4d51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5598",
                "uid": "8da33ea0-ffc5-445c-a76f-baf002ec2887"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6093",
                "uid": "c914c70b-9c7b-415d-9b9a-237504a861e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6165",
                "uid": "7949c391-6eed-4bf0-aa31-c90187ebf3ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5278",
                "uid": "21789c3c-d291-4175-bab4-62495328e265"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:13Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1099",
                "uid": "4c930087-64b5-4b22-bc0f-537bce0fb564"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "2681",
                "uid": "01f39e4f-9018-49a8-bb8d-33694b02d9b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "2641",
                "uid": "8bee3dcc-2e21-48ae-bdbc-106395e41bd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "2645",
                "uid": "1a2a0577-0623-4d4e-9504-d31487b4dd3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6491",
                "uid": "b25cbde1-c48a-4f30-aaa0-bdb4ccaddba6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6684",
                "uid": "f81c7d69-676d-49bb-8b41-c1b4bdc2dac3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5298",
                "uid": "ad1450a9-0bee-424c-b305-7809536b23b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6602",
                "uid": "f42ba70e-2600-42dd-98fb-4db913b3d167"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6134",
                "uid": "d074a55c-001e-46ef-b1ba-83325d018231"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5882",
                "uid": "68e31c9a-0bd3-4a21-be80-397588defc8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6651",
                "uid": "653de5bc-d082-4dfa-9a55-202f1a194606"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5886",
                "uid": "e27116b6-e322-4a79-baef-12626e5d3117"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5386",
                "uid": "ee69c049-bd13-4485-b8e4-2a463e93db5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5424",
                "uid": "c8a4f6df-f06b-43ff-9d19-c61693ef531a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5980",
                "uid": "8f7de854-fd2d-4e33-a3e4-1b33b70ea194"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6167",
                "uid": "84f19118-aa97-4e68-b742-b587dfcec47c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5280",
                "uid": "ce589bc0-c88e-46d9-b62a-d5fe7f829b91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:23Z",
                "name": "cluster-samples-operator",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1663",
                "uid": "823f659d-6fcc-4b90-9406-7c4f78949a72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:26:12Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "13497",
                "uid": "a6ece2d5-5689-4a7c-b1da-468e6fe7ba91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "2815",
                "uid": "abb4f688-593a-4083-baae-709e30300aa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "2680",
                "uid": "ab114a14-7ced-4b48-aaf4-0e693b830bfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "2813",
                "uid": "5c2f80b1-2503-47b5-9589-37f852706716"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6494",
                "uid": "ccd95115-aaab-40e6-89b4-73c32af64e97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6791",
                "uid": "ed9afbb6-bf82-412d-8a1c-d725841bea69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5251",
                "uid": "d004268c-5944-438a-bdb0-6ba6eae29800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6605",
                "uid": "17558b6a-cd5a-4eea-ba75-130ce792ebd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6071",
                "uid": "642e9175-18b7-4a9a-a414-5c2aa2d9dab1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5873",
                "uid": "22d9ece0-38a4-43b0-afcf-6dc0f8f78f4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6674",
                "uid": "82eb9c9b-e6dd-4e9b-a085-839493c32417"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5792",
                "uid": "45f9b05b-638d-4ce6-acef-500d2c631714"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5422",
                "uid": "2075050f-1e1f-4571-b4d5-e045519b1b73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5600",
                "uid": "dc2e248e-1acd-41d7-815d-104e16c613a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6100",
                "uid": "b0653a7f-f712-45e3-afae-5d07f1937cb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6156",
                "uid": "a56a7e14-4c6a-4839-8b5e-a9db56c27495"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5205",
                "uid": "da17353b-2597-4ba4-b09e-188c75ef110d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:16Z",
                "name": "csi-snapshot-controller-leaderelection",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1168",
                "uid": "c5f23ed1-b242-4ac1-a37c-313e3107d2c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:23Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-role",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1675",
                "uid": "8b713674-8f2f-43ad-a438-b4eaeef2b106"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:05Z",
                "name": "prometheus",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "718",
                "uid": "c945cc82-d0fd-49b3-a68a-b9a74c454420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "2814",
                "uid": "f7d5e948-9ecf-42ba-afd7-268195443da5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "2751",
                "uid": "6a305ebd-44c0-4bea-9c11-9354d2dc08df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "2818",
                "uid": "265055c0-6d3b-44ce-a77b-81a901756414"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6473",
                "uid": "47b7e7f2-edb1-4a36-9aec-94dfceb572a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6826",
                "uid": "eac9616b-3fb5-4fcd-b281-8ba929b0ee9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5356",
                "uid": "3a8e62f1-2796-4751-8f45-6341aeae3726"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6468",
                "uid": "01b4f509-b381-43ed-8bc7-9ecb03d825da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6018",
                "uid": "b99d076e-61b4-4b68-ae7c-362e491a8666"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5885",
                "uid": "faa2f751-47a6-4963-903a-6ff14d1530aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6779",
                "uid": "a790ffa7-842e-4083-94ca-ba86c7f52d68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5818",
                "uid": "c48f9a2e-8802-4143-bfd3-1bac1601b55c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5444",
                "uid": "e8b0dfe7-3619-4eeb-8f93-c6a67b7a520c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5655",
                "uid": "182783f5-703c-4a2e-a5df-6bb8073add9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6049",
                "uid": "0f82c06e-efe9-4be6-88cb-b42cf88c1214"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6305",
                "uid": "c7c4614b-3125-4387-aff6-2eaf2009a67e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5153",
                "uid": "20c642bd-d1ae-42e0-a4fe-e9f664521c2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "exclude.release.openshift.io/internal-openshift-hosted": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"exclude.release.openshift.io/internal-openshift-hosted\":\"true\",\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant Prometheus access to monitor the cluster-version operator's metrics.\"},\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-cluster-version\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"prometheus-k8s\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-monitoring\"}]}\n",
                    "kubernetes.io/description": "Grant Prometheus access to monitor the cluster-version operator's metrics."
                },
                "creationTimestamp": "2026-05-10T18:13:58Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "499",
                "uid": "5e0983b4-707b-41f9-b8d0-1da0368cc02c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "2817",
                "uid": "73b395ba-7933-4cc6-a4c6-323e54e0ec25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "2782",
                "uid": "fce271a4-167d-4d83-a4b8-fb9c47d55b0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "2816",
                "uid": "69a77be3-946a-43af-b863-fa37521384d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6367",
                "uid": "565d897a-e676-444b-99e3-53d20ab99595"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6687",
                "uid": "396d6528-af6a-4c73-8f14-8cdab266ee34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5243",
                "uid": "f054dc22-65ad-4b11-8481-a9969bf8e5dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6595",
                "uid": "cceb7f4a-e9ca-4fbd-9eb4-93a7f799f4b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5990",
                "uid": "83d8f4fe-76de-438a-b1bb-cf18e4c90a37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5796",
                "uid": "ecbe9ee0-4453-4f39-8fd8-96c62c6710e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6676",
                "uid": "c391a313-b840-408b-a9e0-f738aa95ddf1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5877",
                "uid": "3c2ce56a-2b48-494c-af1e-53bdae3d9f41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5328",
                "uid": "d2e05518-9a58-48a2-81cf-8ea7dccd8bf3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5483",
                "uid": "64332aff-c92f-442f-904e-3c6d9c401ec2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6154",
                "uid": "f8dd281c-ba34-47f2-aa2c-b61110b5cf15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6347",
                "uid": "134a045e-bb9c-450c-9a45-6e71acd4dde6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5235",
                "uid": "a79b2242-8813-4e08-a5c2-c88340dc34c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:10Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "983",
                "uid": "44119b42-55bf-4b16-951c-e5aa17e9dbff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-configmap-reader",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2098",
                "uid": "883cf1b9-4092-4dc0-83da-7d4acf4d7d57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-configmap-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2084",
                "uid": "2daf3e4d-fc62-4954-b596-2915130f7f67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-public",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2086",
                "uid": "0fe2da7e-9234-4a76-9223-916914353562"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-public"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:26Z",
                "name": "insights-operator-etc-pki-entitlement",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1918",
                "uid": "7013b1ca-85e0-42f7-b71d-18a6e80994cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-etc-pki-entitlement"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:12Z",
                "name": "machine-approver",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1026",
                "uid": "537814c3-c485-419c-96c9-088a81b2a7af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Grants access from any authenticated user to the openshift-network-features ConfigMap"
                },
                "creationTimestamp": "2026-05-10T18:14:53Z",
                "name": "openshift-network-public-role-binding",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3925",
                "uid": "09d059ef-d50b-4a63-96e3-d866302ba549"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-network-public-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "2845",
                "uid": "96ad7b9a-5ffa-45e0-8e93-430f89ec3a1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-managed",
                "resourceVersion": "2812",
                "uid": "630008f8-ec19-4291-a7b7-3222f8e3721c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "2808",
                "uid": "c41e93c6-8250-4293-9797-978b1f6470ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:oauth-servercert-trust",
                "namespace": "openshift-config-managed",
                "resourceVersion": "1671",
                "uid": "b1374628-f1df-4d94-aab6-bbb6018b30cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:oauth-servercert-trust"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6333",
                "uid": "c4943a52-4e68-46d1-acf5-fcb397c5f2b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6805",
                "uid": "36a0c2cf-d27a-499d-bc78-8d42de54c4be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5339",
                "uid": "cfb0580b-f1fb-4472-a5a7-0b02aaab7449"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6537",
                "uid": "25603eb7-59aa-4baf-8462-cc1acf3657a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5970",
                "uid": "a0605e0c-4f10-42f6-b1bd-ddd696a660f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5888",
                "uid": "7711a9bd-ceaa-4f9e-b4b8-ba803c8ce6b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6732",
                "uid": "eb621015-f2c0-4de1-9e62-9d3fb9c8eb82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5904",
                "uid": "8982b137-a4cb-472f-aa30-b60efabf34be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5357",
                "uid": "c6a5e9e5-bd5c-44bc-8ca3-054780702e0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5550",
                "uid": "8b5e3157-b54e-4ffb-ac04-bee1a0da1108"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6032",
                "uid": "716f429c-29d6-4c43-bf2a-095f2951aa30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6267",
                "uid": "341b82d5-3493-455a-abed-ae75b9879e6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5301",
                "uid": "fd9597ef-1a1b-474c-b2dc-3023a699a9e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1871",
                "uid": "ff61bf78-f7ca-4448-b05c-69d3ae40004e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "2900",
                "uid": "1758289d-c224-4893-95ad-c9def156ef2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-operator",
                "resourceVersion": "2846",
                "uid": "eeee2dcc-0cec-4f65-800b-af7778e2626a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "2909",
                "uid": "10f8b3f8-f967-4001-8aa7-bf91b2a8d515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config",
                "resourceVersion": "6281",
                "uid": "fcb01368-c2b4-44bb-a98f-9d57a0a694f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config",
                "resourceVersion": "6743",
                "uid": "e9166cd6-4a97-4c9a-ad11-6ea77b4c52e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config",
                "resourceVersion": "5380",
                "uid": "b821cf45-be1c-4bca-b468-4815736a2894"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config",
                "resourceVersion": "6498",
                "uid": "3061dd83-9769-4fd8-976e-816dd23e6422"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config",
                "resourceVersion": "6057",
                "uid": "376f69ff-3a59-45c2-8d07-0a58922e772c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config",
                "resourceVersion": "5918",
                "uid": "161483a7-72cb-4ded-bf86-56d60459c11a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config",
                "resourceVersion": "6653",
                "uid": "56212eb5-e13b-4ad6-a452-226fabb8c893"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config",
                "resourceVersion": "5887",
                "uid": "d0e9dc1a-67bb-46ea-8465-33c4133dddf6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config",
                "resourceVersion": "5374",
                "uid": "70fa2bfc-db87-4949-9f35-a8be20ac31c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config",
                "resourceVersion": "5472",
                "uid": "eefea01a-6c26-41de-92bd-4e66bf967f89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config",
                "resourceVersion": "6002",
                "uid": "6fe0a3bd-012e-41dc-8c34-8cc9511821dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config",
                "resourceVersion": "6336",
                "uid": "8d1f17ce-ca71-43a0-b065-7c3f2f603b53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config",
                "resourceVersion": "5225",
                "uid": "c0bae1ce-b761-4ba4-bce3-76229fc09ae4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:25Z",
                "name": "cluster-samples-operator-openshift-config-secret-reader",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1820",
                "uid": "5bc1fc34-f886-4596-a95c-28c0684c5a48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "coreos-pull-secret-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2089",
                "uid": "fb61cc74-2237-470e-8afc-22685b47fc24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "dedicated-admins-project-request",
                "namespace": "openshift-config",
                "resourceVersion": "5706",
                "uid": "afa5568f-c004-4d09-9e6d-2f94dbbbd4a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-project-request"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "dedicated-admins-registry-cas-project",
                "namespace": "openshift-config",
                "resourceVersion": "5486",
                "uid": "b0875224-3308-4c42-9917-754b2d3bdb7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-registry-cas-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:20Z",
                "name": "ingress-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1301",
                "uid": "b9a6d646-ef56-472c-9f5c-903b0eba3beb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "insights-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1740",
                "uid": "a179adb8-aa39-441e-a352-c607a2013072"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-config",
                "resourceVersion": "2781",
                "uid": "8cca586e-9615-4bc4-8fb2-7a039f6373c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-config",
                "resourceVersion": "2811",
                "uid": "01ea4666-897a-4bc8-b0e7-4f468f47d1a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config",
                "resourceVersion": "2809",
                "uid": "6a91f9c0-962c-426b-b43f-60e7ac1412f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6388",
                "uid": "c408d420-a329-4120-afc2-c5dcbc648081"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6712",
                "uid": "1ee52349-1e1b-495c-95eb-b9edff16918c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5319",
                "uid": "6066c91c-092b-475a-bc15-ec03f5d46407"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6539",
                "uid": "4f821997-5b5f-4098-abdc-411eab9cbdc3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5991",
                "uid": "1e50821e-ef0e-4434-8ea1-0900387b5116"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5832",
                "uid": "2ddad23f-e7bd-4d32-b6f3-c00f656c11aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6745",
                "uid": "65a5cb36-fd39-498c-8fb2-08fd06c9eea5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5890",
                "uid": "e2a0f8ff-cbb2-4b25-a3f1-47bf5ca2dc7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5388",
                "uid": "77394604-855d-45ed-8f29-ad769ba94515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5594",
                "uid": "dc54890a-a6a7-48fd-a352-51e1e22acd16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5982",
                "uid": "c4f34d18-1817-4d7c-86c4-0b69c498d170"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6189",
                "uid": "babdad6f-1f1e-45b8-bffd-aeda7a948740"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5215",
                "uid": "ff0ef383-3d3c-4c05-b2f5-8be3e96b50eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-operator",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2077",
                "uid": "60c5794a-0ef4-4aef-9a70-babd0fc45ed6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:43Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "3625",
                "uid": "59034dd6-64f2-4d5b-8a4e-7066ac0e4ba5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "2915",
                "uid": "ea37df7b-15ab-484f-92aa-0dbff1d053a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-operator",
                "resourceVersion": "2914",
                "uid": "ce29a2ad-685f-4865-831c-9729c5933505"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "2905",
                "uid": "c45e15a4-dcf9-434f-95c1-fc4937aa8875"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6418",
                "uid": "c8d27519-9566-4f34-b3f2-12043e34dc3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6764",
                "uid": "6a8221be-83f6-4ebf-999b-90cade88fa1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5359",
                "uid": "ddc37763-a273-45d3-86bf-e978504f4228"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6628",
                "uid": "e5eee648-0ad0-4aaa-acd1-2287ffc5a74f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6136",
                "uid": "5028a95d-08df-4b18-8c6d-191ea1b1d2e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5957",
                "uid": "571df44c-0b87-4327-873e-489208e3b489"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6686",
                "uid": "c5779c5d-c13f-4a56-a54a-4f8dc53d29b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5854",
                "uid": "6dfc2b3c-6394-4b6c-adf8-85fd2d07e997"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5457",
                "uid": "bd3727eb-ef4d-4687-b952-51ad4bedad3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5553",
                "uid": "c6d48b76-76f9-4f04-b107-92c066c35a92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6137",
                "uid": "d1e4f81b-3748-4a33-b7e1-754c377571fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6290",
                "uid": "a6e09f7d-4f20-43a5-b67e-c7a84f73c12a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5264",
                "uid": "bf3f59a5-cac1-49f5-995b-591db8357b45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:27Z",
                "name": "console-user-settings-admin",
                "namespace": "openshift-console-user-settings",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2054",
                "uid": "47e20995-ddd2-4136-b2f2-e9e1a7a72d0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-user-settings-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "2906",
                "uid": "80f797d0-7cfd-42f2-8b1a-414686c92bdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "2908",
                "uid": "de44fad8-cb2a-4d0f-8b14-f1be1ba005a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "2913",
                "uid": "ad1d42d0-c643-4686-856c-b9ed8cbe1e7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console",
                "resourceVersion": "6482",
                "uid": "1611a618-8d8b-4767-b028-97e24f6b8f5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console",
                "resourceVersion": "6792",
                "uid": "ceeaca45-e97b-4c6e-9976-b0fece40a87a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console",
                "resourceVersion": "5287",
                "uid": "af5d80de-af6a-4aca-9023-627d7ad52599"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console",
                "resourceVersion": "6625",
                "uid": "22d40db3-2fca-4dac-946d-dd1fd731efa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console",
                "resourceVersion": "6096",
                "uid": "acef522b-67f9-4f82-9f31-8d74d36026a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console",
                "resourceVersion": "5844",
                "uid": "2dcb65d8-7e38-4708-b4ae-9a3e1bbf2b02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console",
                "resourceVersion": "6633",
                "uid": "53fc0602-f71a-4b09-81a2-f2b3f1ecbe67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console",
                "resourceVersion": "5925",
                "uid": "c60bdbf7-2549-4160-8875-4564f6f86e5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console",
                "resourceVersion": "5348",
                "uid": "62f53a37-b379-4757-9bc4-0639660b4fe6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console",
                "resourceVersion": "5462",
                "uid": "fc18f179-b8ba-407b-a207-cd79d9a6fb1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console",
                "resourceVersion": "6069",
                "uid": "88f7b714-36e5-4529-a585-25814bab07c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console",
                "resourceVersion": "6230",
                "uid": "47a1639a-84ed-47ad-831e-50ae33a72e49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console",
                "resourceVersion": "5292",
                "uid": "b4fabd89-6489-44c7-b185-3a583072ad47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-operator",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2075",
                "uid": "929b3e79-0bf2-4030-9f8a-d161d866e003"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:43Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "3622",
                "uid": "ca858719-f839-4a73-9d94-25ce90240e83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-console",
                "resourceVersion": "2911",
                "uid": "10b46458-abab-4d1e-9cd6-9d46e46da439"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-console",
                "resourceVersion": "2879",
                "uid": "24bc2dfc-bc77-477b-8088-a0ad1faed3d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console",
                "resourceVersion": "2904",
                "uid": "e79139b0-6c32-4f18-b7bc-5cd3ed1a31b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6440",
                "uid": "67e6abf8-f772-403b-8cdf-6d23b926cb47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6768",
                "uid": "82ab8896-7ddd-4379-974d-fcde58fc6027"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5246",
                "uid": "771b6e90-be8c-455c-b8d9-1b838d8664fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6509",
                "uid": "36cc48e3-6224-4285-9182-f116e2a4ace7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6061",
                "uid": "f9c4fca7-9daa-43d7-a639-fe68ed282dd4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5798",
                "uid": "e250965d-9aaa-4ae7-b3a0-81b2cc36d777"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6762",
                "uid": "31ce03c9-01f5-44e5-9f25-7d4007f88043"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5858",
                "uid": "2d95f763-8328-4760-85ef-f09897115f5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5331",
                "uid": "35633799-25e2-4e26-bc13-79b606cd59ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5602",
                "uid": "85591eae-2443-4577-ad66-1a1c35577c89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6129",
                "uid": "573ce341-3646-41ea-a045-62a897cc0b2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6351",
                "uid": "12e4db82-304c-4704-99a6-21bad08909c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5257",
                "uid": "b2845b56-b36c-4e4f-bf99-b92f90f655e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "827",
                "uid": "69004cd4-6efc-4abd-b2e6-4efc24aa7fc6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "2961",
                "uid": "04d9a0b4-8ee0-4bcf-a456-e56e05555710"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "2910",
                "uid": "ed67c8f3-e383-4f19-83ad-e2a3f515b12f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "2962",
                "uid": "22e7a8fd-4d9a-4540-b78a-f8e9d8291f74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6439",
                "uid": "37cfe01f-73b7-40e7-aa96-f418d700d1a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6666",
                "uid": "44c64684-2157-4195-b874-97ae48b34221"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5390",
                "uid": "23d424e6-1abc-4db8-a003-78928e98a954"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6582",
                "uid": "487ee068-0642-4813-abbe-719d214d4de4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6035",
                "uid": "c582e1e6-42b0-4ecc-9af2-08884e52cb93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5861",
                "uid": "dc142be6-aa31-48e1-be6a-1f93cfbb70a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6688",
                "uid": "2fe358db-d4b0-4d99-9848-22da33fa2c01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5820",
                "uid": "b696126d-539e-4966-901c-770e60c98661"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5408",
                "uid": "adb2caee-5c62-42b7-a302-40fba38da38a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5490",
                "uid": "faf92447-2c8c-4ef9-8357-3e35b2ba7931"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6117",
                "uid": "dadbb9ed-65a2-4092-b5d4-dd023ab9811e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6365",
                "uid": "9dd5bc22-0909-4a2e-ba4f-1b15819dad84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5255",
                "uid": "2f15d7dc-aee0-4de5-8777-8a83e6c355c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "2902",
                "uid": "94080cc6-3c51-44b4-ba60-a72faed1d9ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "2907",
                "uid": "0f1d6184-60d4-4ec0-bd52-c76703702d43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "2912",
                "uid": "8aa405ee-94a0-4a56-b92e-c05c2c05a0e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6322",
                "uid": "6b50715b-9adf-447f-a75f-83343b962af0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6803",
                "uid": "c652a1cd-575d-4201-8b7b-0b980601e436"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5383",
                "uid": "0104d3d0-6f0b-4dc4-ad9c-98fec4bf033d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6470",
                "uid": "ab2f1f2e-65eb-4991-a431-c95eba1257af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5973",
                "uid": "fb2df3e7-9ae7-422f-ab05-632019abedc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5926",
                "uid": "f8631b81-3d44-4563-8f84-18d57b60f82a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6659",
                "uid": "827f4b56-43d8-49a6-8263-2c9e92a31dd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5940",
                "uid": "b86ae7c9-cb96-447f-8a6a-190ef84640d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5423",
                "uid": "5f5d508d-c024-410f-a6b1-c4c76dd8266d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5481",
                "uid": "a4b310ce-cdf5-414f-b272-4932f5e943c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6004",
                "uid": "f979ea01-a007-4aff-bfe9-e6d75de2e953"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6192",
                "uid": "76636b3f-0ea5-4ec7-8874-66ebb668beb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5208",
                "uid": "4f11b76d-f423-4f9f-9353-49db6a3f77e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "dedicated-admins-customer-monitoring-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6182",
                "uid": "475bb5a5-47ce-4b55-8944-27132c6b36c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "dedicated-admins-customer-monitoring-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6201",
                "uid": "3dab2fc6-b2e5-4b6e-9c47-f9aa145f373c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "dedicated-admins-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5031",
                "uid": "89140712-fa2b-4672-8be1-7447e8573391"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "prometheus-k8s-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5028",
                "uid": "0b9ebd38-59eb-4692-adaf-a7ff1af331f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:deployers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5025",
                "uid": "c2d5ad22-842a-47ab-a22c-ea490deb34ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5030",
                "uid": "6b05cf0c-728a-45d2-9145-7b5223b56938"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5021",
                "uid": "0d686a4c-0530-4dbf-9ad2-6586250b0ac7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:34Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c",
                        "uid": "aceaadfb-9669-4031-b6fa-5a438b0b34fc"
                    }
                ],
                "resourceVersion": "9865",
                "uid": "474d8488-528b-475c-9b6d-c9fb73f5f27c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6487",
                "uid": "cba46631-be01-4d7d-8e5a-33d3347a19c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6828",
                "uid": "c0b3ef42-088c-4989-aa9b-a2953f41522a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:31Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6868",
                "uid": "8ecfac87-75b1-4079-ab00-4df699da2540"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6463",
                "uid": "8969a78e-6887-4db3-a2a9-c47e7f87a33b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:46Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6968",
                "uid": "75c463dd-0975-4acb-b864-ee8cc3367c7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6939",
                "uid": "a9de8183-0947-4fbb-baec-70fba530bfa7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6722",
                "uid": "d13c7fe9-0de0-4889-bdd4-c751e73eaa2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6949",
                "uid": "b9ecac4d-ad28-409d-87b3-a9881a241a71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:32Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6874",
                "uid": "940c3aba-0f82-4841-86d7-dc2ca12fb5fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:38Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6923",
                "uid": "ddcf1c32-b3b4-4b41-853d-270dba13e5b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6988",
                "uid": "fbddd45b-c3ad-4524-83ac-9013266bfa5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6999",
                "uid": "e54b9c31-8633-463a-a557-280cc93258cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6838",
                "uid": "9a05701e-3836-48b3-bffe-e05c5e7391d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:16Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.595-gbf89fe8",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "93kS0invRXyvjvhKUqw0RmNXHlq3DWDtSuHFzO",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-7rLkLi3Nk0YvyK9xTCUeUEoOvQKqfsPU8GLVFH",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                        "uid": "d82c397b-8e6c-48ec-a2b5-fd5d00afa38d"
                    }
                ],
                "resourceVersion": "11576",
                "uid": "573cec4b-06b9-4131-a12b-4908e95d0bdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-op-7rLkLi3Nk0YvyK9xTCUeUEoOvQKqfsPU8GLVFH"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:14Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                        "uid": "fd3c2581-d7d4-4496-a480-36471f611f71"
                    }
                ],
                "resourceVersion": "11177",
                "uid": "4a1ae7e1-00d1-48c4-98d8-04a77a87aa9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-operator.v0.1.595-gbf89fe8"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "system:deployers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6232",
                "uid": "9ba0e959-5e5a-44ff-92ee-63bfe5461d9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6231",
                "uid": "45047ef3-6c58-419f-be3d-89626eacea6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6225",
                "uid": "74fc8dc5-2795-4dd3-ac1d-413d5121378f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6421",
                "uid": "50c9002a-b486-40ea-8d6e-be9c3bc16f22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6804",
                "uid": "2d1cceee-5a47-4b76-8755-d1558d1b0657"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5254",
                "uid": "16a94032-b467-4b70-a4d6-8475365219af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6542",
                "uid": "a14a55d5-a913-4209-8b48-afa72fc3f97b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6118",
                "uid": "ed2a43d9-80e3-426a-a27b-494a6d6c8fea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5784",
                "uid": "f185978e-e742-4cc5-b7e5-239d5cada9af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6780",
                "uid": "954afce9-3fe7-40da-80ef-c132d53e0ae9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5942",
                "uid": "eac45a39-1db7-4c4d-937d-308d431c8ae3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5332",
                "uid": "8944848c-f5d8-4c01-b26e-6b32e382fa5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5434",
                "uid": "4663d8c2-6739-474e-9603-e6de2eae8b73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6052",
                "uid": "621d438b-092e-47ea-9f7c-266f1125df6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6148",
                "uid": "93f483ed-8b7d-4191-ab86-b46baeed8895"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5155",
                "uid": "5558eda5-5be2-471b-a482-e39dbd5bfbd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:11Z",
                "name": "dns-operator",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1016",
                "uid": "f0793cc9-3bb4-4ea0-8cb1-cbfdfc6401a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:11Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1011",
                "uid": "5da9ecea-18f2-489f-a00e-27d87d414724"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "2960",
                "uid": "ede75ca9-bffd-4715-9bf0-20a4d16be3d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "2985",
                "uid": "293adb8c-670e-464f-bc87-4be75ec9e853"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "2959",
                "uid": "989a559c-5d73-4711-b428-675504bd98f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6372",
                "uid": "4540cc8c-ffdf-40df-a272-33a6bb996875"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6713",
                "uid": "605c8246-d176-48d3-9162-58a077f27b48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5341",
                "uid": "ab0b9efe-3079-4c26-97d9-91d8db13e332"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6472",
                "uid": "2bdf5cd2-085b-4542-86f8-a9cb7ca6d015"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6099",
                "uid": "09ad9cb9-cfbc-4013-a2fd-dd229216cfea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5849",
                "uid": "e823c842-cd48-4e32-b2ba-3b547b86d4fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6695",
                "uid": "4fabe7ac-87dd-46c0-8334-3c27162063aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5936",
                "uid": "a59f17e1-9c6d-48ad-9aba-74d30dd364ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5401",
                "uid": "6093e269-b1ef-4106-96cb-4d58cbe1644b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5503",
                "uid": "bb852bc1-377f-4c34-aa74-2fcaa29660fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6074",
                "uid": "d3a061f3-ebba-41eb-906a-d88f092ba55b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns",
                "resourceVersion": "6291",
                "uid": "6f574712-8e56-44dd-996e-b071502e460d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5210",
                "uid": "92e535e1-dc87-4cd2-9ef4-efe3ea8a2827"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "dedicated-admins-openshift-dns",
                "namespace": "openshift-dns",
                "resourceVersion": "5126",
                "uid": "4a29c37e-09af-46cd-8f5e-990cfaf47ac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-dns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:23Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns",
                "resourceVersion": "1535",
                "uid": "6836d04c-a7aa-464a-89f7-081ef3460e26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-dns",
                "resourceVersion": "2958",
                "uid": "6c119b63-9ae5-4ef2-9319-e4fff6d45395"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:35Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns",
                "resourceVersion": "2938",
                "uid": "fa8395da-6a60-47c1-aaeb-7a097ad2a9d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns",
                "resourceVersion": "2989",
                "uid": "86254be3-1ba7-44fc-b928-0ed3b75b363a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6324",
                "uid": "3aa5116b-5cd5-42a0-a21c-0905fdb6949a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6770",
                "uid": "92dc8321-cb32-4391-b5dc-6c0bc3c3383b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5414",
                "uid": "f9594be2-c9cb-42c5-8548-5c9f62ef8e67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6598",
                "uid": "12c3fbbe-f7f7-4afb-8bef-dcb5ac600b50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6101",
                "uid": "0e3e28c8-0de9-419f-9664-720ec7c27c69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5834",
                "uid": "e2d0b52e-131d-4ffe-885f-890ad73cf858"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6623",
                "uid": "2dffb0fb-ce39-470b-a013-7f0b03f1671c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5837",
                "uid": "ffa91747-08c1-4e72-8e05-a3167704c1b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5413",
                "uid": "65c60e81-0362-4df6-aec1-5b2304f28829"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5474",
                "uid": "d9d5c31a-3ed1-4e2a-a8a4-75fc5d614112"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6054",
                "uid": "fa5072a7-12ed-40d1-8f24-4a04dcac7827"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "6338",
                "uid": "55c53f37-b7b5-47ff-bc4a-d593c7f33d06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5158",
                "uid": "d9da0ef2-4df3-4319-8bb3-5823a3481df3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-etcd",
                "resourceVersion": "2965",
                "uid": "7dd4ee63-0710-4f7a-b610-3b5cdeedf82e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-etcd",
                "resourceVersion": "2964",
                "uid": "6f073134-d6bf-4e7b-9531-c59dbef8b473"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-etcd",
                "resourceVersion": "2963",
                "uid": "4768c830-38c0-485f-9872-4b7e5b8ca268"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:43Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18436",
                "uid": "a557defc-73a5-43a8-ad21-4366ae372c22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:50Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18570",
                "uid": "b85beb8b-1fa7-4373-ac14-866c885cffbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:39Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18357",
                "uid": "152aa23e-9536-4d3a-9aed-2f041258ca42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "17685",
                "uid": "55521f5d-0dd4-483e-af42-47b245758e4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "17726",
                "uid": "49ff15e9-7017-4703-934b-2c7437609ba8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "17510",
                "uid": "ca55a83e-03e7-43ac-854d-0de48e6b2dcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:53Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18611",
                "uid": "fbc58c2b-cd00-442d-a7a6-df007bd918f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18472",
                "uid": "e266d655-5e69-46f8-8a68-a04613842b36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:35Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18163",
                "uid": "8ab89d24-d896-4892-9cff-711726da74c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:37Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "18315",
                "uid": "77819dc1-4788-44eb-901a-445db3f6e3cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18414",
                "uid": "86595440-8911-4005-a927-e12a073caada"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "18638",
                "uid": "abe8d2c6-414f-4aa4-9a4e-3e854335d0e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:31Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "17857",
                "uid": "0b940143-6b11-432b-8267-061e1be89e30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:36:25Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd-applicationset"
                },
                "name": "openshift-gitops-applicationset-controller",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17612",
                "uid": "fb9fad64-7167-4bd9-88fb-f0b7b81b3be0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-applicationset-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:36:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-application-controller",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17471",
                "uid": "77d6b44e-595a-4934-b3a0-5f0a45f54abe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:36:23Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-dex-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-dex-server",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17360",
                "uid": "854955f9-5a6e-452d-889e-066b80a15b44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-dex-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-dex-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:36:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-redis",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-redis",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17502",
                "uid": "363c8f28-b5f7-490f-a0b6-85d533a74c37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-redis"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-redis",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:36:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-redis-ha",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-redis-ha",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17495",
                "uid": "44893caf-aca1-4020-94ef-91cb542a4d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-redis-ha"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-redis-ha",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:36:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-server",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17486",
                "uid": "a57fc5f4-4c43-4226-b63c-1c4abaf130c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:23Z",
                "name": "openshift-gitops-prometheus-k8s-read-binding",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "e650f513-071a-414d-91ff-3963ea3ad680"
                    }
                ],
                "resourceVersion": "17327",
                "uid": "6131344b-a38c-4d45-97b0-d1bf87dbaa0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:36:23Z",
                "name": "system:deployers",
                "namespace": "openshift-gitops",
                "resourceVersion": "17392",
                "uid": "ec6db489-073d-45b6-bf81-6d539d42a931"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:36:23Z",
                "name": "system:image-builders",
                "namespace": "openshift-gitops",
                "resourceVersion": "17391",
                "uid": "32aed2eb-f2bf-4074-96dd-0cd08f9bcaf0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:36:23Z",
                "name": "system:image-pullers",
                "namespace": "openshift-gitops",
                "resourceVersion": "17370",
                "uid": "b3d0fc77-dde7-443b-98dd-1194f421d0d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6410",
                "uid": "b058b355-d729-4a3d-ad4c-7c4d5c97d5b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6697",
                "uid": "9b9214aa-1e62-48ca-a75d-82ab11adaeb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5342",
                "uid": "19f345f3-65d4-4382-88d3-9c2d52cded35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6547",
                "uid": "5c054a1a-81ca-4a83-8c87-b3866c4cd461"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6020",
                "uid": "07557cfd-4119-4491-9ae4-96eb11cfcf86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5922",
                "uid": "e0c4eb97-be6b-42f3-8782-a990e13a1658"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6635",
                "uid": "3fcb6546-3319-4e79-922a-fc197da58bf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5950",
                "uid": "04b05d8b-9909-44c5-a7fd-73422412a87d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5464",
                "uid": "261d2297-fbbc-44f8-8ea4-9b39ce3bea99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5465",
                "uid": "b73cad1d-8649-4166-a7e2-26b4d8a96f00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5987",
                "uid": "47413b26-e488-4881-98e0-6554aa44a25e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "6195",
                "uid": "5b3d188c-0299-419f-bfcf-2bc3edae7f9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5227",
                "uid": "291da38c-08d5-4c08-8ddb-96b0fd742d6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:49Z",
                "name": "system:deployers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3730",
                "uid": "e278e602-ff68-4728-9f75-b60822955d22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-host-network",
                "resourceVersion": "3731",
                "uid": "7dc9696e-3355-4086-9e26-989f8443303d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3729",
                "uid": "53aaab77-8b24-44d2-9db0-4da39a7150ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6296",
                "uid": "04b5ee93-dd08-4371-85bb-a3830d24eda8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6807",
                "uid": "500e5f37-ccfe-4cba-93d7-b75dc16c6629"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5312",
                "uid": "7e509eef-5bdc-4b8f-868f-48f6e0f63962"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6599",
                "uid": "fc956e6d-d308-4791-abf6-c319b0aec0b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6140",
                "uid": "3518f183-5dc6-4c30-bb0c-db44022b2fb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5830",
                "uid": "3ed6b716-4e5d-48af-a62d-5134d938d5f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6765",
                "uid": "ebe3c594-d3de-4a6f-aebb-c06e0c184b3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5937",
                "uid": "a153ea50-6565-4ca8-841f-2e75896e4894"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5425",
                "uid": "233108bd-28de-487b-9d05-1e3eb95df91d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5555",
                "uid": "fa864302-1e06-48bb-9f75-58a2810cd18b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6034",
                "uid": "c66a3c4a-4853-4814-a961-38f4c6b0804b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6171",
                "uid": "408f7e73-bc68-485e-bddc-e3648982ce0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5216",
                "uid": "d575832e-29ee-4dce-8833-be6f3a440869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "cluster-image-registry-operator",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1681",
                "uid": "ccc4e9b9-354c-4f87-904b-35b2d330399b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:25Z",
                "name": "node-ca",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1843",
                "uid": "0651107b-f012-439c-88f7-58961fbed79b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "node-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-ca",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:11Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "999",
                "uid": "2b788527-f7ed-4530-b73b-6ef21e348e4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "2986",
                "uid": "7807bf78-e7bb-447a-a7bb-cfde1f4b5647"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-image-registry",
                "resourceVersion": "2987",
                "uid": "93baaf3b-c8f1-495d-9ac8-d5c7868c5d4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "2990",
                "uid": "da015aaf-71e0-480a-84f1-a790d81aa474"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6299",
                "uid": "48a7c6fb-b047-46dd-9b1c-cae59ea7d718"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6808",
                "uid": "737ddcfc-e4f1-4978-bcc1-fdefae446b53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5314",
                "uid": "290723df-7232-4688-9ef5-5afd9d051d85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6474",
                "uid": "d2fd751d-b76b-4cb1-a90f-6b9a97f9c55d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6038",
                "uid": "06164aca-f77f-47a8-8e8f-c5bcdd065eba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5815",
                "uid": "3eef501c-963e-4e95-874b-a180f30be4e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6690",
                "uid": "308c4dd6-cc9a-4370-8d3d-7fa0000655d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5823",
                "uid": "d54e53ed-940b-4422-ba49-48901cbe4d89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5446",
                "uid": "8c232c91-5117-4ba6-ad65-24ebb42575f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5544",
                "uid": "1bdef4e7-e149-4efd-b5a6-c1bf8a5db20d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6095",
                "uid": "2dbfa969-2812-41ec-afa7-8f8f1690306d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-infra",
                "resourceVersion": "6150",
                "uid": "4cc13561-fcec-4954-a4a1-bd1689f885fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5304",
                "uid": "d571807f-6a1b-426a-af6a-81da38c4b701"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-infra",
                "resourceVersion": "3004",
                "uid": "1f697f48-b2a2-4809-a132-6d772ac5637c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-infra",
                "resourceVersion": "2988",
                "uid": "7280ab4c-c07b-413a-b13c-f904eb943c34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-infra",
                "resourceVersion": "3003",
                "uid": "b6d8880e-c898-42b7-84cd-b730f6b7656e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6374",
                "uid": "0d77a088-fae2-41ad-b79b-42ed700af687"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6689",
                "uid": "d3ca1048-1ee9-430a-8f97-a1aff8861a93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5347",
                "uid": "ea802700-4263-401f-82f1-504310b774a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6630",
                "uid": "50bc24c3-5c9a-473f-bd48-7bbb7e714019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5985",
                "uid": "c64f22c4-cf24-4010-bf9d-04534bfb1043"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5905",
                "uid": "2e49dc4e-b3b7-4def-9e8a-f830b67aa6ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6753",
                "uid": "434dbd05-61cb-4302-a527-f6f762ff50cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5802",
                "uid": "13d4fa8b-2981-4b62-a739-b5d1b8f9841c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5402",
                "uid": "9af65d3f-f4b9-4c4f-b638-e45072738e18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5493",
                "uid": "1cfd97bd-d287-45f4-829f-09ef23649dfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6056",
                "uid": "9295ed67-20e7-4d42-a838-600e53ad98c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6200",
                "uid": "2d708633-c63d-4243-8062-632f54b0bc07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5259",
                "uid": "db57206c-730b-4c6e-97b5-6e76fab722eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3005",
                "uid": "0526a26b-fa67-42ad-8042-0a3d40feb6f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3009",
                "uid": "0cda458c-5cf5-4047-92ab-b6be50568f78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3008",
                "uid": "d94f9f38-8bbf-41f0-9463-8cf8c1b49152"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6413",
                "uid": "795392e2-c524-4551-a06c-95a7c1d9c522"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6716",
                "uid": "5311a31a-7d21-4899-bf77-733e94c13528"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5336",
                "uid": "9b9be10f-96fb-45fc-aa8e-6e7cb3d1e7cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6500",
                "uid": "54a52b74-55e3-495d-aef9-54a877829c52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6047",
                "uid": "3956e015-2106-47fc-81f5-ce8da465eee7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5800",
                "uid": "cd2da535-04e1-4809-b671-20563d4c8535"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6626",
                "uid": "07d7c2e8-102e-4a33-a99a-8578b87cf390"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5894",
                "uid": "f5721804-139f-4b92-8976-920345f6f03b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5415",
                "uid": "67695b74-9bbc-4cf0-8beb-56b276d51d4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5510",
                "uid": "c4b6be2b-0563-4a61-8fd1-a988e3259f67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6169",
                "uid": "f4b17bc0-bc0f-4e71-8d18-cbf017adb656"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6172",
                "uid": "b1641737-4fef-4534-8e2f-43142c693555"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5307",
                "uid": "30d8e53b-e385-419d-8f99-f845456a3c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:20Z",
                "name": "ingress-operator",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1264",
                "uid": "990666e7-9be3-49d9-a8e9-ec19e3d64858"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:43Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "3626",
                "uid": "ace717de-236a-4b2e-b25d-9f1bed31ede7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3006",
                "uid": "e084be50-148a-4b20-af6c-6fa189af7554"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3029",
                "uid": "f620883f-ab9d-437f-9cfe-5e6cdf0a51eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3026",
                "uid": "35e38eb9-bd3d-4bb6-905e-4b6fcce8535c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6356",
                "uid": "526b3188-6969-4d29-82a8-0788c31f78b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6761",
                "uid": "2860fc0b-1c09-4728-8520-b6ef011a4705"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5346",
                "uid": "f4c5b036-362a-4606-857e-bce07e8f5486"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6549",
                "uid": "b549e17c-ebf4-485e-b956-e51b429d668b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6122",
                "uid": "a053d6b5-953c-4948-b928-990c1f6864d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5943",
                "uid": "8bd27ac9-3839-4d00-bbe9-da3ceb7e5a05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6725",
                "uid": "e640440b-883c-4353-b70c-061dfc43dedf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5892",
                "uid": "6af88f17-d891-47bc-9bab-439011eeec7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5467",
                "uid": "d27a04b4-0b82-4105-8d4d-ffaf6a092712"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5556",
                "uid": "c1e7812c-6f5c-41a8-8850-f57d2b0291ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6119",
                "uid": "97495e19-9c48-45c9-865e-7e6b7fa30d4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "6274",
                "uid": "9a2f1235-47e2-43d1-8917-d59fbeecf8b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5295",
                "uid": "c8049774-3448-415e-a64b-c9a8e9fb3e76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:26Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress",
                "resourceVersion": "1976",
                "uid": "e894b1f2-e9ed-4645-881d-35c779af7f0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3007",
                "uid": "be61fd32-dc6e-499a-be65-d8c4ea193832"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress",
                "resourceVersion": "2984",
                "uid": "d6c53267-9590-43a5-b8c6-61f6498e74c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3010",
                "uid": "446f073c-043f-4071-83ad-545040d92331"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6312",
                "uid": "fe5e1b52-ab44-4376-8573-0bccb6518cfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6645",
                "uid": "ecadd50f-71e9-4a5e-8068-b7906b0ef140"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5266",
                "uid": "b9170c6b-02c3-4535-abd8-119cfecb803c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6466",
                "uid": "742e20bc-5c6e-4e3c-8d3d-afd7a1e5c677"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6110",
                "uid": "3940d7e8-43ff-45a3-84dc-fb16c7cc47bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5803",
                "uid": "21c90038-b726-46fb-aa95-b077afaea277"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6637",
                "uid": "317fa43f-adc0-4a10-abdc-d8d54f80d3e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5966",
                "uid": "bddc5ead-a301-4aec-9244-d9098f9f9ab8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5334",
                "uid": "15ccd680-f908-45dc-a3da-b4f645a00f50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5546",
                "uid": "eb1a8801-6c6c-4bbf-a17f-207312ca1c91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6060",
                "uid": "1f68d4f6-f3a9-4c23-b9d2-d8e0b64756ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-insights",
                "resourceVersion": "6249",
                "uid": "9b854635-2018-455f-a854-50de93fcd190"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5240",
                "uid": "4400aaea-290c-4f4b-9e29-4e35afc86e65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:25Z",
                "name": "insights-operator",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1803",
                "uid": "528f179e-fe20-454a-95de-fa82d8bd7449"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:25Z",
                "name": "insights-operator-obfuscation-secret",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1880",
                "uid": "76cfba42-c293-4be9-9b74-ff9f8ba59d07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-obfuscation-secret"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2099",
                "uid": "05ff3817-f6ad-45a1-a84f-6b59f0cb3613"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-insights",
                "resourceVersion": "3030",
                "uid": "adca7de1-abfc-41c9-bfaf-361139e40671"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-insights",
                "resourceVersion": "3031",
                "uid": "cd38153d-ac11-4bb6-ab02-5d951ab708a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-insights",
                "resourceVersion": "3025",
                "uid": "5d6dd904-59c0-479c-b5ca-6e6ef641343e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6416",
                "uid": "28568ec8-1f0e-4725-962a-a019a56477a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6733",
                "uid": "5d2132c9-59df-4a31-b92f-b036944ea3a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5291",
                "uid": "ca128ea1-aa9c-4325-97f6-340a7915dbca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6444",
                "uid": "82da28cf-b085-4f66-bf15-1f59dfd93110"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6021",
                "uid": "89a07bf1-5984-4624-ac69-547cfef1f81f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5928",
                "uid": "36a0f4cd-7019-4995-a16a-c25957ab053a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6755",
                "uid": "c493a4a9-4152-46be-9bbc-0317d15ad5b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5840",
                "uid": "30da9d12-c694-4f4f-9147-5428d044350f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5416",
                "uid": "57adce66-304a-4065-bfb2-bd473c2f7b5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5514",
                "uid": "e8aae094-4e39-481d-85a7-09a2fb73efbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6083",
                "uid": "282e363d-da50-4be8-980b-d24567dd8912"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6205",
                "uid": "17a7bc4c-5c53-4bee-9380-79e3ff44db64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5229",
                "uid": "2f9ee6f6-3fa0-49a0-ac7f-f591a2d9d4ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:43Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "3616",
                "uid": "28cd2966-e965-4b1e-87f7-85f3f856fbdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3047",
                "uid": "143db596-5208-4b29-98fd-761a0e677ea2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3028",
                "uid": "351b9531-4500-4c94-8580-010d25af985e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3048",
                "uid": "910b8b5d-db26-46dc-b3f6-ef6682d28ede"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6376",
                "uid": "148e8b23-617b-4a9f-ab12-af5a64087ab5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6648",
                "uid": "87d4b5ff-c2f1-4d7f-8c02-28ad5a7291f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5248",
                "uid": "8861d4fa-b75a-4b5c-b25a-2384f13bc616"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6530",
                "uid": "b2713082-741e-427e-a2d8-513e3dfc44a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6040",
                "uid": "c99d1923-0ff8-4edb-bac9-8ccf6ecc5753"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5787",
                "uid": "6c1a2084-2d88-4daa-8f8a-e7d4deb2d160"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6661",
                "uid": "94b70ce5-39d4-467d-bfa4-e07df7bb01cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5944",
                "uid": "df8ee00f-2ae7-4124-bb55-c08598f3f9f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5459",
                "uid": "95a18bf5-6828-4e8f-a52f-75a069c4d3df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5512",
                "uid": "25a6b044-edae-4f64-87dd-09173271262c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6078",
                "uid": "de649529-6d8c-445a-ae37-3131119491e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6202",
                "uid": "a2edf15f-1b77-4f42-bcfb-f7909e0faaef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5242",
                "uid": "d48df7af-1fef-4470-b419-dd1ef5ca7a51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3050",
                "uid": "a790745b-64d2-4a77-bba2-944583976487"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3027",
                "uid": "f42f59a3-eb6e-4967-9550-f41df2c60a53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3051",
                "uid": "bfb89c9b-aebb-49a5-a8b6-9c280695893b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6476",
                "uid": "127955ad-6111-4b7d-b2b7-01b92ed59883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6726",
                "uid": "a80acd9a-1f37-4d71-8fcf-e8b3a33de250"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5322",
                "uid": "b453e01c-1618-4ade-b503-c3829a8c632c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6480",
                "uid": "abb131a6-26f2-4809-87d9-27951859402c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6102",
                "uid": "97802f62-319a-4cee-9f97-29bd01c2ce31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5851",
                "uid": "7aab00c8-24a4-4e54-a3b8-1a5a5c662626"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6728",
                "uid": "2b996611-0467-4070-bfa6-a531423568c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5912",
                "uid": "f7af9134-3be9-4e74-9ebc-18ae71aa7b0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5377",
                "uid": "cbdbe13e-b15f-4498-8e77-1805a9381d37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5504",
                "uid": "9c899c55-1b1a-49d6-a6a0-3791e9cd6e9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6025",
                "uid": "4becfb3d-67fd-49cf-878d-1c3593ef565f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6377",
                "uid": "b733e21b-54df-4d93-b7b5-bbd1df191312"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5231",
                "uid": "4a6ac551-0f83-48a2-bfd9-db6814a7ee25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:07Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "828",
                "uid": "d66ae94c-1935-41f2-aee7-cf0188e91669"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3052",
                "uid": "015d735d-083b-4f77-bcdf-0f68f2820362"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3070",
                "uid": "8afd0170-9659-42d1-8198-8bb5be6003d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3071",
                "uid": "a812d095-7026-47bd-891b-b66f0d29e411"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6301",
                "uid": "5d473e7f-619e-4405-9aa8-038a51c61d4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6691",
                "uid": "6f2e9af4-a395-4f54-b5ce-5ec65d41193a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5316",
                "uid": "5f30896c-1d6b-4eb0-ab0b-c8f0ddf19f98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6490",
                "uid": "9f13296a-907e-414f-b017-c326da4c8d6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6042",
                "uid": "03f5c92e-9afa-4414-aa66-19568d5493f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5893",
                "uid": "78b17fd1-6b2e-4ae4-acff-0d0cd755fc77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6638",
                "uid": "4a427327-3e77-4597-9652-abb7119dfa1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5879",
                "uid": "16f039e1-cf1a-4230-a329-1031896b0991"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5448",
                "uid": "7b2550a8-4d06-4441-ae78-79700ed15501"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5658",
                "uid": "7cb9bb62-d405-4418-aa3b-31f69d092b07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5989",
                "uid": "4e908b2f-f34a-473a-88ea-fb5cf3777fe8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6297",
                "uid": "eaab544d-4f69-46db-8b9b-69020fe726f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5244",
                "uid": "d2024135-7a5d-4f47-9a02-5577277f5339"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1779",
                "uid": "f37a9fc9-e0b1-4d12-a2fc-701bc08ca0a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3053",
                "uid": "d167935a-2349-4a20-8252-e5e83bac289a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3049",
                "uid": "63537b74-10e4-43f3-8ca4-4b8676229a43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3046",
                "uid": "1ff3ea53-cb6a-41e0-84ef-79d74b2de8da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6310",
                "uid": "01be927c-af17-4fb1-888b-aa0256e43d52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6810",
                "uid": "5725a50a-e70e-428a-bbbe-ee3e4396df7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5256",
                "uid": "24de9edb-fe9e-4876-abb5-7ee1dfcb1041"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6608",
                "uid": "a1cd269b-71bf-4a2e-ab38-de452e01068b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6142",
                "uid": "e8b2d8fd-24ee-448a-9537-cc4d942dbb4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5897",
                "uid": "eb7d6abe-6ce8-4be4-b3e3-46e26529700e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6729",
                "uid": "b8513ee3-ad40-4cc8-8f4a-751e846b9994"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5908",
                "uid": "6b28e3f8-42e6-4342-b3a9-152aba03d358"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5391",
                "uid": "755cec73-57f0-447a-93f6-39acac25cd7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5659",
                "uid": "e13b27f9-f2de-4045-88bb-a0f51469e1bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6036",
                "uid": "a139efc5-d203-4b0e-a5a8-3b32c6431135"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6380",
                "uid": "69a9b20b-0ea3-4cf2-989e-db297fcbd7cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5159",
                "uid": "e3c3949a-5ec5-4101-83b3-b201dd0f3042"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:05Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "722",
                "uid": "8e33d173-a540-47f9-bec8-e5c7e6b26edd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3109",
                "uid": "e8164ac0-a4d8-4fde-b2af-2bb9f2415284"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3072",
                "uid": "48664a54-2eec-4b05-96a5-8aa24517c0e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3107",
                "uid": "4fbef643-f757-4e7b-aaf7-a1be0c9e91cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6423",
                "uid": "801b32ef-944b-4304-97a5-c8a01a8a0b88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6746",
                "uid": "3771785c-73d9-4455-a73d-76358176e73d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5293",
                "uid": "7ec9d290-7012-4a4f-a8ad-3605a60ab6d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6584",
                "uid": "7ab0c3ba-f2ab-4f47-98d2-8660f7005d28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5994",
                "uid": "191bfea5-2f4c-48ab-a77c-d637702cba21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5949",
                "uid": "942d561b-5ae6-4aff-9d37-0b7165bc187c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6696",
                "uid": "ae79dd54-ee97-4164-9459-a2ad33f0e2e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5953",
                "uid": "faf90147-7e68-4c4c-a38a-ec2c401c3a9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5461",
                "uid": "ff231019-dfc5-41a2-a06d-76125c206b7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5580",
                "uid": "fd2bedf5-e9a0-474e-b810-8b21c06aadfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6041",
                "uid": "c7a7ba9b-ec85-4ec2-aba3-e8ee8ff03a74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6174",
                "uid": "948d2212-7af4-4902-8f42-8fa8202cb8c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5268",
                "uid": "71058629-f206-4e5d-b4b1-4b3d3cf4e1d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3068",
                "uid": "5eba47bd-5ca1-4892-a214-ae5521aed2bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3074",
                "uid": "3bb51e83-b337-43bc-bcb9-67ee1ce18f71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3069",
                "uid": "54ea509e-278f-47e2-bec6-971444f6552d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6358",
                "uid": "9cdf0c7f-d4ec-4a21-9c4b-035932183610"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6774",
                "uid": "9319176e-79a0-464e-9ae6-9678c232fb11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5350",
                "uid": "3770de78-b18e-4597-90ce-a348e84d6294"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6611",
                "uid": "60755776-2e62-4483-a702-909aa55203ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6084",
                "uid": "fe2632b3-fdc5-4c9a-aff2-2f404ee29098"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5899",
                "uid": "395bdf97-d7d8-4ac0-a4fd-76055e525174"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6655",
                "uid": "432a9fad-73d5-4705-a040-8a5054c0d491"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5860",
                "uid": "2bc5c68b-0d35-4f96-9f57-a4530ada25c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5358",
                "uid": "d2a64ffb-fe75-42ad-bce5-cabd1c02869e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5603",
                "uid": "30c979f7-c56d-43a0-9832-398ae2d6d17b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6014",
                "uid": "e90ab970-7685-47df-bcb4-042e66052763"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6254",
                "uid": "aeec8244-3973-4db8-9f7e-876cb3bb9fb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5283",
                "uid": "7819c324-400a-4edc-a168-ef2a125bccb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3112",
                "uid": "ca7246b0-2994-4ad9-a3ce-4dc1f20fcae0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3073",
                "uid": "a0dbfe65-2562-4211-a795-2f1cc84a0133"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3110",
                "uid": "378463fe-7f00-45e3-b23a-babc03312b0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:00Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10666",
                "uid": "4a62cd0c-0609-49f4-b27f-771ae90e68b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11446",
                "uid": "c543cb6f-ce33-4629-94de-87e79098ad7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:55Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10527",
                "uid": "20b5f801-4fa9-4f5f-900d-e9143795929e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:26Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "12087",
                "uid": "d6e3d629-e6a7-4ddd-9657-ce5c1e1b5a9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:13Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11068",
                "uid": "6ee84038-d96c-464c-a17b-62728ea48fe6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:15Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11258",
                "uid": "71813f92-6ca6-4334-b449-c0a9976d1bfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10780",
                "uid": "df710fae-9f49-4325-92eb-85937dd1ce0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:58Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10605",
                "uid": "443549e2-b543-447d-85d0-7873fd039020"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10433",
                "uid": "bd6c8200-400b-44ae-8db1-c3fc80425e67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:11Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10927",
                "uid": "9af469f3-a1a4-4703-88c5-c4645249bdf0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:20Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11524",
                "uid": "2951f555-da72-447a-9350-eaf543baf633"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10775",
                "uid": "e39f90c2-086e-4894-b539-3b98f571dac2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:08Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10820",
                "uid": "e0eda1ee-7096-4b43-bf8b-737d0ad875bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:24:48Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10276",
                "uid": "85cdbab5-2ad3-4069-b3c7-383e96717277"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:24:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10275",
                "uid": "49ee86bb-04de-46b6-ae4d-c5fa37d76bf6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:24:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10274",
                "uid": "159cf472-b875-470d-bda0-4ffd47ac957c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:54Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "24284",
                "uid": "cc94f889-28b1-4fc9-b65e-1fc3de7c20a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "24643",
                "uid": "51fc4ca4-d57e-432f-882a-7f94f6429e5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "25845",
                "uid": "5d411f75-f35f-4536-9246-c2209a38ab78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "25907",
                "uid": "113fa22a-1b1f-4e0b-ad2f-2858d2302261"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "26600",
                "uid": "7e15fa1d-e9c9-4b8f-b10a-385918e09fc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:02Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "24994",
                "uid": "aa9ac9cc-6d6b-4fee-82fc-9cf7b9dca8ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:12Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "25921",
                "uid": "1031bd4a-d42c-4c6c-a7e3-f0c9d22d27d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "24927",
                "uid": "036e900b-3d10-453e-b5fa-1f7372536615"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "24171",
                "uid": "c197bca4-6a2e-4fb9-97ac-985c83a0a151"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:08Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "25589",
                "uid": "4663e5ce-3480-4ab0-b2d8-b06f420b0ad9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:21Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "26377",
                "uid": "49ab2e8f-e425-454c-8cb1-3cd902674485"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "24981",
                "uid": "8b9a3251-b64d-4c98-ab0f-caa18f49566c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:22Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "26394",
                "uid": "333cf71a-f62c-42ab-9e54-cd4427723ee8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:03Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-leader-election-rolebinding",
                "namespace": "openshift-kueue-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4a70c7f9-1771-44fa-bee1-0d305218a2cf"
                    }
                ],
                "resourceVersion": "36152",
                "uid": "a8e2d772-eceb-426e-b07c-d7c23dd468a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kueue-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:03Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-manager-secrets-rolebinding",
                "namespace": "openshift-kueue-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4a70c7f9-1771-44fa-bee1-0d305218a2cf"
                    }
                ],
                "resourceVersion": "36158",
                "uid": "ef73350e-1081-4c04-b101-072a3d441a74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kueue-manager-secrets-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:44Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "kueue-operator.v1.3.1",
                "namespace": "openshift-kueue-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "kueue-operator.v1.3.1",
                        "uid": "cf8ea1eb-316c-4b86-b72e-d4eea16c5d90"
                    }
                ],
                "resourceVersion": "30189",
                "uid": "dd2b8ac4-4d2c-4f57-b57d-612802ddae3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kueue-operator.v1.3.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:47Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "kueue-operator.v1.3.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-kueue-operator",
                    "olm.permissions.hash": "7JQKXUsH3EPXXCggkNkECFfrcGIiHEYfxKx4u",
                    "operators.coreos.com/kueue-operator.openshift-kueue-operator": ""
                },
                "name": "kueue-operator.v1.3.1-op-ajhI9xeYndqitg2BSAoQ5xh94GcmxZKDH6HlzD",
                "namespace": "openshift-kueue-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "kueue-operator.v1.3.1",
                        "uid": "96c01ed6-8214-4d66-9b96-62d8a196250c"
                    }
                ],
                "resourceVersion": "30605",
                "uid": "19a7bf90-c22e-45b2-976c-65c38d1db4e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kueue-operator.v1.3.1-op-ajhI9xeYndqitg2BSAoQ5xh94GcmxZKDH6HlzD"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:43:04Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kueue-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4a70c7f9-1771-44fa-bee1-0d305218a2cf"
                    }
                ],
                "resourceVersion": "36161",
                "uid": "10259879-4471-4723-87a9-c92ab39733a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "system:deployers",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "23564",
                "uid": "c7830d97-e568-40e0-8d77-05489e77a469"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "23563",
                "uid": "e3705afe-c0f6-4512-84b8-65c1538f2b7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kueue-operator",
                "resourceVersion": "23548",
                "uid": "77e057fc-1706-4c3b-9a3b-3d18c0802406"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "6414",
                "uid": "f62900eb-27fc-4584-999c-c8c30cb09819"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "6419",
                "uid": "ad2da894-31fa-4c73-a03d-8f0920d85701"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:53Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-logging",
                "resourceVersion": "7047",
                "uid": "ca8253bf-e9b1-4b04-9d2b-33e36aea4de5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6717",
                "uid": "d27a5426-f52e-424e-949c-086a3325105d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6839",
                "uid": "9a9e1941-ea71-46bc-808a-5f0643519660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6493",
                "uid": "bee28906-ec10-41c5-a186-951d2e694878"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:44Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6957",
                "uid": "d67f94f9-94bd-4bcf-b329-715c1cdff86d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6928",
                "uid": "1bd9118e-09c0-46dc-900e-712613a56e94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6698",
                "uid": "9dfae290-ba49-494a-b7d7-cdcbcf649334"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6947",
                "uid": "d71ddffb-22e3-4e7a-86b8-723218e5e7ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:34Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6892",
                "uid": "bf8255bd-c95d-41a7-99ab-9f7565a0c8c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:38Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6918",
                "uid": "d92c4559-06d3-464a-8498-0232a760109e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6980",
                "uid": "3e7aaf5d-2765-47e4-86f3-8b4baaf82d49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6996",
                "uid": "96aefd3c-5df4-4c7d-931a-af4c0feceb57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6809",
                "uid": "cfa01764-f066-45d2-9e3f-3160d2b7513b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "openshift-logging-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "6422",
                "uid": "97bd69eb-186e-4c3b-80ac-547f4092b403"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "openshift-logging:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "6426",
                "uid": "829bf426-1b7a-4f9a-b3c8-b713fa976877"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "system:deployers",
                "namespace": "openshift-logging",
                "resourceVersion": "6412",
                "uid": "53dc05a4-b2b9-4e4c-a26d-313d70b93234"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-logging",
                "resourceVersion": "6408",
                "uid": "7500419a-2572-430a-a56c-d66aef4e7625"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-logging",
                "resourceVersion": "6409",
                "uid": "90c6d8ef-50f6-4706-9e4e-5490a9c8f2dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6427",
                "uid": "b6b1f5a4-913a-40c9-ac5b-78536d6bf6b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6672",
                "uid": "4840cd96-4633-4f50-8af8-97700893709d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5270",
                "uid": "4e71d086-5a2c-4822-b942-5b8bbc6964c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6551",
                "uid": "d2e6e4d5-14b9-4b95-badd-7f24cfcfc7e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6087",
                "uid": "6e2e6aad-d70f-4071-aa5b-cdc4271cd20d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5901",
                "uid": "404f1111-f709-4b94-847a-737d499a28c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6783",
                "uid": "45050e03-3422-414a-a562-a2a8ae5d1e54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5929",
                "uid": "df72a7be-68d4-4a8c-82f4-a89531b2ee9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5361",
                "uid": "f502c920-2274-4fc2-996f-cc88a5b4657b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5478",
                "uid": "65c7b9cd-4120-4131-84a3-1ee882a857a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6097",
                "uid": "b8e524e6-afc0-4e2a-a512-ab2af2010927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6354",
                "uid": "b55f791d-719d-4af6-8ecf-d605395b730b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5189",
                "uid": "889e3f68-96ef-4167-8b1a-b0d7d8c9b0e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:16Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1163",
                "uid": "d073b82d-eda0-4076-bfe9-f77845e20630"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:07Z",
                "name": "cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "812",
                "uid": "2d9437be-1fe7-4174-aa05-da1372b9c177"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:16Z",
                "name": "prometheus-k8s-cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1173",
                "uid": "89b0927b-09d3-40ee-9dac-e32876ca0b08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3089",
                "uid": "1d51a4ba-5b56-427c-ba3c-66ec35fd0918"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3114",
                "uid": "6667b062-4a40-42f6-8c79-d98e88223ca4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3111",
                "uid": "ef6e8198-79b9-4913-a5bd-ef4900b450a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6348",
                "uid": "a7055070-fbff-4593-b2e0-848b6c20cbee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6650",
                "uid": "74cc1a32-8beb-413a-aca9-44ffcbdc61d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5241",
                "uid": "ff96c7d0-9b92-4834-af86-337a5cb176dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6613",
                "uid": "275a8270-9b68-4d75-b24a-2c608bba7258"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5988",
                "uid": "0fa3fb3d-d6f6-45b7-a11b-2eb879ee3026"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5805",
                "uid": "2361cd38-0b05-46a9-9a7b-4045217d61f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6609",
                "uid": "321dd962-0f07-4d77-8feb-d0a469543e6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5938",
                "uid": "ea9c2550-5533-4be3-b623-a5d871108165"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5325",
                "uid": "7090fbb7-9d55-45fc-8953-6470acab0eec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5559",
                "uid": "ccbb04b3-865f-410a-99d0-8c692d5fd948"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6141",
                "uid": "a4998d3f-00a2-4dea-91c4-24ce4a720f1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6357",
                "uid": "3dd09d83-8df8-4530-bcf5-8db817c261b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5269",
                "uid": "528ff171-3e60-4349-96c2-d0720666f042"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:17Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1200",
                "uid": "f3520966-b2f6-4015-b2c3-0174a86e77fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3088",
                "uid": "cc158a3a-11f6-40ae-b13c-b00ef639f1ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3106",
                "uid": "a260de7e-5236-41f9-9f51-74110e8bf26f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3118",
                "uid": "1795266a-95ec-4a28-91c8-eedb30860f9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:04Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "17a99d6ca47a679fb33d2c518bf850bfc45a326865bcabba4ffdde75335ea6a",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "17a99d6ca47a679fb33d2c518bf850bfc45a326865bcabba4ffdde75335ea6a",
                        "uid": "44a331a1-a656-44b9-8361-dee8c0a2c99d"
                    }
                ],
                "resourceVersion": "16864",
                "uid": "0d236a38-7864-4e5d-a12c-e89e82abf0d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "17a99d6ca47a679fb33d2c518bf850bfc45a326865bcabba4ffdde75335ea6a"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:38Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "2bb52b92bd31ddf2ebbc335370ac517be50e61a93c2fe375393413c19d32cf3",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "2bb52b92bd31ddf2ebbc335370ac517be50e61a93c2fe375393413c19d32cf3",
                        "uid": "e40c0510-e04f-4ba1-aa82-a30283faada6"
                    }
                ],
                "resourceVersion": "22686",
                "uid": "4633318b-e47b-496d-97b3-9b04ea1eae24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "2bb52b92bd31ddf2ebbc335370ac517be50e61a93c2fe375393413c19d32cf3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:09Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "6f1b31efcfb27140ad3ba60d3ef8fffb4185f63fa7eda365f5cf70c1d2bab04",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "6f1b31efcfb27140ad3ba60d3ef8fffb4185f63fa7eda365f5cf70c1d2bab04",
                        "uid": "72a40866-ed15-4f85-9f07-4d69ec53a25b"
                    }
                ],
                "resourceVersion": "19936",
                "uid": "d477e6df-d76a-49d4-b4f5-32ee44e85d60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "6f1b31efcfb27140ad3ba60d3ef8fffb4185f63fa7eda365f5cf70c1d2bab04"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:19Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "8b4e077dc5c0ff8f78c438464c40dd1d659d080d9a2131015042643bf99dba6",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "8b4e077dc5c0ff8f78c438464c40dd1d659d080d9a2131015042643bf99dba6",
                        "uid": "4b5840ed-9308-42b5-9367-6f3b799e8fec"
                    }
                ],
                "resourceVersion": "29042",
                "uid": "e83207a4-d9bc-440a-b17e-8c130eddbda2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "8b4e077dc5c0ff8f78c438464c40dd1d659d080d9a2131015042643bf99dba6"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:44Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "b907a0434c1bb16654b385f035a234aee19031a8e0c5174cd9d865dbef71955",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "b907a0434c1bb16654b385f035a234aee19031a8e0c5174cd9d865dbef71955",
                        "uid": "c9da5eec-3cc1-40b3-8ecc-9d032689fb28"
                    }
                ],
                "resourceVersion": "30138",
                "uid": "87db551a-c450-4820-8555-8e564d427d04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "b907a0434c1bb16654b385f035a234aee19031a8e0c5174cd9d865dbef71955"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6443",
                "uid": "fe499e06-58d9-4349-aabb-630167ad1010"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6748",
                "uid": "97b226d1-2e4a-45f7-b8a2-32e7655be135"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5395",
                "uid": "7b0ee6e5-3732-4e2b-854b-003d467a24cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6495",
                "uid": "51bf610f-10eb-407c-a31d-f26350564fe3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6026",
                "uid": "6dad3999-0508-4c63-9898-0ff6547a6ee7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5932",
                "uid": "a9fb38fb-74c9-43fe-ad89-5c85a9b71f2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6612",
                "uid": "9d0fc333-391e-4db3-9b78-e4a3568d3c8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5915",
                "uid": "2debd19e-55ee-4bf2-894c-f9cb8460e9b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5364",
                "uid": "97b5bde2-1cf3-4728-a05c-2b669fc001ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5517",
                "uid": "a080fa5d-f70f-4a6e-b62e-5391d645a62e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6005",
                "uid": "651e45b9-1a02-430c-a083-efd3c94bd379"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6342",
                "uid": "a1ebc893-2766-4cca-bfe0-10ecd1f98489"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5121",
                "uid": "d1473956-30a0-47b7-ab36-3c1ed46b198c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:47Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "d5326ed087797225d22b49d44b9de7548ce9d0b5f5c4e59abaf9f85d8940ee1",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "d5326ed087797225d22b49d44b9de7548ce9d0b5f5c4e59abaf9f85d8940ee1",
                        "uid": "c7fb99a5-24d6-4209-8a4f-173dfd489743"
                    }
                ],
                "resourceVersion": "27690",
                "uid": "f7f78c2a-4b1e-4e04-afb9-d184a5b0eab7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "d5326ed087797225d22b49d44b9de7548ce9d0b5f5c4e59abaf9f85d8940ee1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "dedicated-admins-openshift-marketplace",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5122",
                "uid": "0bf5d31f-0221-4277-a705-9b6f698e2509"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-marketplace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3117",
                "uid": "c74fa1b1-7fd9-4b8a-a0b9-7ce3190a46bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3115",
                "uid": "171eae15-8342-4fdf-854a-2e18a122b75c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3108",
                "uid": "3b12dad9-9f84-4883-aeea-a3e3b6c7f540"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:23Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-prometheusk8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "11870",
                "uid": "dfdb647a-25cb-49da-9a58-9c80dc6930a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:17Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-prometheususer-workload",
                "namespace": "openshift-monitoring",
                "resourceVersion": "20642",
                "uid": "ce4e088c-c2d2-46ed-a9e2-bca3daf8e55d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-user-workload",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:28Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-thanos-ruler",
                "namespace": "openshift-monitoring",
                "resourceVersion": "21842",
                "uid": "ae647784-7bf0-4201-9336-48912567fd87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-ruler",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:01Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6285",
                "uid": "bc14fe0e-26b8-45ff-a7b2-723271d1ca50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "backplane-cee",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5734",
                "uid": "33226898-7b39-4515-92c4-f2744d3b2316"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6820",
                "uid": "a7ab84a9-5f8d-4c3a-8745-c6189acb643b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5385",
                "uid": "95c2b443-9998-459f-a233-9a9e7e1fb7dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6435",
                "uid": "a589206c-035f-4c96-9490-9e8264e87a39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-lpsre",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5656",
                "uid": "40ca597d-c73a-43ab-a1a1-27c950dd882e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5995",
                "uid": "0593e78c-319d-4ab5-b6b8-67d9002dac37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5853",
                "uid": "e2433fef-a5f4-4493-90a5-07183eef3af3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-mcs-tier-two",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6538",
                "uid": "3f850ce8-ed7d-41c7-a0e3-ad1d2cfc599e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6747",
                "uid": "f13ee073-6e12-4d5f-b6bd-6a8631ba03ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5843",
                "uid": "655ff8ae-8e7e-4e72-9832-5542e4572615"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5471",
                "uid": "6d600e4c-2dd3-47d6-ada8-83b4aeb84e22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5605",
                "uid": "fa5c2195-61e3-4084-8a72-cf16f4026d8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6173",
                "uid": "1b86d90c-ddb5-4711-9dac-79011db1e5b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6258",
                "uid": "5734601c-e2e0-490d-b6c3-8510da60090a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5285",
                "uid": "42f33dc0-1cb2-4885-bc88-a00bd35a4912"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:23Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1564",
                "uid": "3380d088-62c9-43be-a524-70806381bcc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "cluster-monitoring-operator-alert-customization",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1704",
                "uid": "85dff2d0-61dc-4a6d-89bf-cc9b2611591e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-monitoring-operator-alert-customization"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:28Z",
                "name": "console-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "2093",
                "uid": "2fd91d68-c7d1-427b-80b6-da026cb85336"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:35Z",
                "name": "dedicated-admins-hostedcluster-uwm",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5698",
                "uid": "6787492e-4b17-4ca5-93fe-f63db2a720b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-hostedcluster-uwm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:21Z",
                "name": "insights-operator-alertmanager",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1340",
                "uid": "996d6f88-4bab-470d-b3fc-6a949b246869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:23Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "11946",
                "uid": "d7cc374f-7fae-471f-9ed3-8e9f8c2a9096"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s-config",
                "namespace": "openshift-monitoring",
                "resourceVersion": "11956",
                "uid": "82ec8524-cdfa-4da1-8005-2730cf9e504c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-config"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "3116",
                "uid": "93276969-05a1-48b0-8e2f-4e21e1239b49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-monitoring",
                "resourceVersion": "3105",
                "uid": "99defd44-cf5a-40f0-9d22-ea3bd1b9daf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "3144",
                "uid": "0a904a10-4b45-406a-b8e6-c1b7c4dc3e4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6496",
                "uid": "3173cbe0-ae3f-4421-87c7-8657820d695a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6795",
                "uid": "7cd6dc94-f450-428f-8c2c-d1b234a4e2bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5326",
                "uid": "7154199b-1b46-422a-bd91-98fb45753eb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6634",
                "uid": "525b6e12-88e8-437f-ac3e-ad9ad853cb8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5997",
                "uid": "78bc0ca9-0f93-4a94-a64d-59d99ed907e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5819",
                "uid": "9838b7cd-6a13-4e9f-9529-838906ab392a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6641",
                "uid": "8ab87e94-c46a-4e0b-93f4-6d6ad1d406df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5863",
                "uid": "233d0f2c-edd3-44a9-9a37-cef47fc09e13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5352",
                "uid": "ef83af05-901f-4a8c-b19b-98b8834bd63c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:34Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5663",
                "uid": "c1dd35fa-e093-4072-a429-60244dca3163"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6070",
                "uid": "4347eb34-0a93-4429-b161-1296de094632"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-multus",
                "resourceVersion": "6261",
                "uid": "cd8f0117-b60d-4341-a79f-b00da7395016"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5125",
                "uid": "2280f31f-c0e1-4288-9d00-05dbdeb402db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "multus-whereabouts",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3299",
                "uid": "f7e341c0-46e3-47c2-b18b-700ccb5dc193"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:41Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3528",
                "uid": "8d7fd402-cb58-47d1-a1a2-96c34bd10ad5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:deployers",
                "namespace": "openshift-multus",
                "resourceVersion": "3181",
                "uid": "7a8c2be2-d117-4c68-9812-e6dee1fb845f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-multus",
                "resourceVersion": "3185",
                "uid": "da003a7e-2a61-4826-8f20-1e5b5659e341"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-multus",
                "resourceVersion": "3183",
                "uid": "028f6ede-2c70-41ce-83a9-f8a87fc46093"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6360",
                "uid": "031fdd95-ecf4-463c-992f-0bc53791f376"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6720",
                "uid": "4a4a721c-0078-406f-ac91-bac9748e644d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:36Z",
                "name": "backplane-cee-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5737",
                "uid": "d854040f-e27d-4607-9552-97dc50fed0ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5258",
                "uid": "cfb2c61a-a76e-4be1-a220-a102e1441dc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6447",
                "uid": "8c0e345e-e820-4807-b5e4-7789ef012069"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-csm-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5766",
                "uid": "ce129680-f9c9-4059-995d-208848ec0c3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6125",
                "uid": "2bfb7f19-99d9-4d6a-8f3c-2dcfae107c72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:35Z",
                "name": "backplane-lpsre-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5695",
                "uid": "e9d7499a-1cf0-4ea5-b1f1-f38415946900"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5911",
                "uid": "2959c86c-0b0b-4c6b-a2b5-1a7dbb0fb58d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6642",
                "uid": "f97b38d4-bef9-474d-8f99-bccb0829ef4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-mcs-tier-two-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6544",
                "uid": "98c9a7a8-fb10-4714-853c-299f46f82b69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5870",
                "uid": "238c4ccc-0758-464b-8917-699e65f66abd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-mobb-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5548",
                "uid": "eef4ffe1-5292-4e03-9a99-6d1d9e4e8a8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5433",
                "uid": "0992f77d-d870-40bd-a383-ecad6a9c3241"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5586",
                "uid": "763bdb11-7f11-42ce-ba91-5aa1b27517d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5597",
                "uid": "c1704fd1-5bd6-4edb-9790-994e77a0cc86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6017",
                "uid": "0f5b22c0-4b5f-4780-a880-368b57ca7c3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6318",
                "uid": "b85a700e-30fe-45c3-8965-cb2e9019eb18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:17Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5247",
                "uid": "612210b9-5012-448f-8541-427af807d2bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "backplane-tam-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5098",
                "uid": "93155d41-634e-4399-8e3f-726cac6e9762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:deployers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5026",
                "uid": "abfda7b4-8275-4d29-85e7-3bf064c4dc19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5024",
                "uid": "92eb7c36-3880-4cfd-acb1-c54621229d72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:17:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5023",
                "uid": "148cf83a-4f4a-48e0-ab57-eccd041d949c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6326",
                "uid": "77707703-b348-4a14-824e-4f2805e10ddf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6699",
                "uid": "2a80ecfe-1056-4303-b15f-464e7f0dd2f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5387",
                "uid": "b6986dca-e726-4594-8a03-677f1fb4322c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6571",
                "uid": "dd2c499e-1ae5-43e8-819e-1e57257e7e43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5975",
                "uid": "af0fc83b-dbaf-47c5-910c-ed50dc36cc25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5821",
                "uid": "a4c6416a-753a-4969-bfc6-5c6f699a1fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6644",
                "uid": "c1d01576-59dd-4985-9a4f-cb1eac30ecab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5930",
                "uid": "313569c2-79b8-4751-9034-345dd066402b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5454",
                "uid": "7e50b14f-f24f-4c31-934b-2471197fb4ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:35Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5665",
                "uid": "fb65f6db-8655-426c-848e-75d6ff49342c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6086",
                "uid": "3a0ffeec-3a1a-46fe-8b80-dbaf14e602b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "6176",
                "uid": "42a046df-172f-4374-840f-709c9a13c646"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5297",
                "uid": "7d7dd62d-1bad-47af-a5ae-1144e845b0cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:18Z",
                "name": "system:deployers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4374",
                "uid": "33c623b8-1cfb-46b2-94f9-b80bdfea7757"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:18Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-console",
                "resourceVersion": "4372",
                "uid": "6ad5adb9-4317-4dbf-b524-fa8f8c173034"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:18Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4373",
                "uid": "40176c7b-e2a3-4b57-b3a8-880e7534817e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6330",
                "uid": "de6a0d6c-48f7-4a6d-b1fc-07afc8c36175"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6703",
                "uid": "4156592b-b421-465e-99a7-cb897082bfec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5273",
                "uid": "6168c248-32d2-4b22-9820-59a8fcfc32bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6615",
                "uid": "ffa57af1-d2cd-4b0f-85f2-67b0312f95c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6062",
                "uid": "e65f692c-7e28-4bc7-8536-e872fb3b56ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5875",
                "uid": "25dfad60-7d0d-438f-8461-9770d1f49591"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6785",
                "uid": "25ed5a2b-66ba-4a73-aeee-73d550d46719"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5910",
                "uid": "1c6f9de5-0a58-4eaf-85a2-09c3b524f357"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5438",
                "uid": "70e9d8fd-6e88-42bc-9a9f-2575d8441cd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5470",
                "uid": "7abd1945-d173-490e-a830-8796d73d2b09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6157",
                "uid": "eef6aad2-f653-44e2-9e35-3cb941656761"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6158",
                "uid": "e8d13f55-97f4-4fa6-8cdc-7af56d51cb72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5218",
                "uid": "a2f18644-625e-44f3-8afd-99056fe758ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:50Z",
                "name": "network-diagnostics",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3771",
                "uid": "6349bcf4-c422-4f8d-acc6-e9e250fdf48c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:52Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3797",
                "uid": "3088b4c3-0531-4f84-9633-4319a188f847"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:50Z",
                "name": "system:deployers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3759",
                "uid": "fcaa64c6-93ee-4544-a465-89f7d86f0530"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3758",
                "uid": "d9553e02-847e-4661-baad-c586d9633d6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3761",
                "uid": "27896517-7ac4-40f8-bc2c-ba523022148e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:03Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6331",
                "uid": "aa69b172-6ad6-430c-b4f1-0ab7ed3d1bef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6821",
                "uid": "c971d4c7-48eb-438a-998d-4efd53a5d433"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5367",
                "uid": "548f723d-997b-4ac7-a429-645ccad3edb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6475",
                "uid": "b7f66a9b-7338-4624-ae8d-5a9c45da4974"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5998",
                "uid": "e5b28915-bf6d-48f9-8f15-026bd59eccb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5933",
                "uid": "6e2b7a96-013b-4d6d-bb5c-6bab37568592"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6614",
                "uid": "501cdd1f-3927-4d2f-bc7f-4dbd13af13b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5917",
                "uid": "64ff18c3-d74e-4c3c-b394-cc0a1ca915b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5379",
                "uid": "7e27fa68-faba-47a8-ae80-5b283c4ac90d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5595",
                "uid": "1e6a1465-7912-46a4-abe7-a50ff0ce1de5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6109",
                "uid": "5c188ddc-5ff9-43b3-8422-5f19fbac7f4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6193",
                "uid": "6093f021-47e1-4691-b135-f8beb308dc55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5219",
                "uid": "f15dfe47-d1c5-46d1-9aed-f5da546247b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:54Z",
                "name": "network-node-identity-leases",
                "namespace": "openshift-network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "4095",
                "uid": "d675ca8e-a2b5-45d7-a782-c77c9ed705da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-node-identity-leases"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:53Z",
                "name": "system:deployers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4033",
                "uid": "ed03ee8a-ef6b-4913-9830-0c14a8b303ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:53Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4032",
                "uid": "c99f84a5-c979-487b-9933-c7b1db5fb0c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:53Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4002",
                "uid": "ba1bc3d1-d583-43ac-bb7f-a61455aaeb75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6353",
                "uid": "14d4d615-24dc-4e49-b642-5c364ec539fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6752",
                "uid": "4b19e126-9e62-49ca-a320-5688fd11e7c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5277",
                "uid": "e51d9ce6-2655-439e-8557-4a555c141f4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6438",
                "uid": "b7e830de-d9a6-4275-b7d0-ce11bde52852"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6048",
                "uid": "bde5adb6-8346-4c9b-88bc-83b2b02dc198"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5864",
                "uid": "e5f4361e-11b8-4743-b111-c42938320a3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6735",
                "uid": "f0a3899d-c519-4fb1-9af3-2b98f0cdd3eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5804",
                "uid": "6548bda9-aff5-4a3b-ba49-2cbf8a55b1b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5439",
                "uid": "71b4e619-5633-4818-9199-d0249cbc86d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5589",
                "uid": "7ba07c51-630c-4bc3-a08e-b993ad0f888e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6123",
                "uid": "e209724c-efc7-4973-8687-4b2af5738ad1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:04Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6366",
                "uid": "f77e5302-29fb-4353-899d-9f85e076cbdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5192",
                "uid": "908109d4-4a2c-4b4b-b196-0f620831fa66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:21Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1357",
                "uid": "c92d0b66-dfed-4fff-8523-e734ba89213f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "3104",
                "uid": "5960234e-d85f-4fca-a329-618b19a54eea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-operator",
                "resourceVersion": "3113",
                "uid": "6e91c685-698c-4743-bb4c-d4e6905f8963"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "3146",
                "uid": "11c92195-3e26-4006-a642-1dbaf13642ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-node",
                "resourceVersion": "6429",
                "uid": "f5f3d105-6985-46d5-bd14-dd7abae45209"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-node",
                "resourceVersion": "6667",
                "uid": "469f1801-486d-4b89-8e3d-8b57c86b968b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-node",
                "resourceVersion": "5300",
                "uid": "abbf6394-855f-40d5-8fa9-9053d41a83eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-node",
                "resourceVersion": "6586",
                "uid": "2b7c0181-d2fb-4be5-b640-8f3686079a64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-node",
                "resourceVersion": "6077",
                "uid": "b7e7bcf3-3f82-4156-98d3-50d9e1d7689c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-node",
                "resourceVersion": "5822",
                "uid": "3a24c0f0-672e-4314-8f87-73528a1a89cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-node",
                "resourceVersion": "6702",
                "uid": "1892ae4f-9f17-47f6-a3c0-115d345d45ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-node",
                "resourceVersion": "5946",
                "uid": "deb79d97-7c9d-4b6a-bc5c-e481fdc74505"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-node",
                "resourceVersion": "5473",
                "uid": "97988432-2f63-46f4-b8d4-d83b8d8f4878"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:27Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-node",
                "resourceVersion": "5451",
                "uid": "2ae9635a-0fc3-4631-8ae5-e6b584eb2a3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-node",
                "resourceVersion": "6175",
                "uid": "600584be-0a8f-4e36-9ad6-082f46fc3f0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-node",
                "resourceVersion": "6266",
                "uid": "8f9f2442-3f51-41ad-9037-efef7494baf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-node",
                "resourceVersion": "5233",
                "uid": "48c47df9-4e5c-453f-a7b8-acf0d275bdb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-node",
                "resourceVersion": "3143",
                "uid": "25f6ad14-65e3-498c-b59a-77a1446a7b82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-node",
                "resourceVersion": "3139",
                "uid": "2163ba28-6df5-491b-b35e-bb4ac3943d81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-node",
                "resourceVersion": "3142",
                "uid": "4866be3a-51f2-4197-bbc3-5b870c415471"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:41Z",
                "name": "system:node-config-reader",
                "namespace": "openshift-node",
                "resourceVersion": "463",
                "uid": "5698083f-0f9a-4866-a22c-986d5053aa4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:node-config-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6431",
                "uid": "75fd35dc-2ec3-4ef7-b6f0-05a7dd1f3a3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6778",
                "uid": "296669db-3026-4201-b8f9-13a6624b908a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5302",
                "uid": "9dda3d6a-8155-4230-8432-b8bd9615142a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6577",
                "uid": "b4e2cb1b-ec93-440b-b6aa-9330adf89e93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6064",
                "uid": "ba21526c-c243-4744-94d7-dbb217dd13c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5866",
                "uid": "8b265b29-5397-4fa4-afb5-495462d14e74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6704",
                "uid": "c5050751-e725-4977-b26e-003e67b7a3e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5827",
                "uid": "744ea619-a4fa-4c37-8ddf-722511e68168"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5409",
                "uid": "f468c20c-1b5b-42cb-868c-cff4c4565782"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:33Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5596",
                "uid": "391a9b6c-0fc4-430c-af4d-e4558f85089a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6089",
                "uid": "d0ade179-4f3f-4620-8fa8-343c4843648e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6370",
                "uid": "d6a4862b-1923-4ff9-aac0-9f8f988e34b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5271",
                "uid": "77623acc-14dc-47e6-bda2-9e8ae0c71ad4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "3145",
                "uid": "83283253-e19f-4365-b18b-3df0cf0e3b6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "3164",
                "uid": "74317331-3900-412f-b30e-fdb812cd5cf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "3140",
                "uid": "31993722-d48d-4c95-bdea-678fced08a8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6575",
                "uid": "a22efd34-08fe-442a-a04c-9570d5849bc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6576",
                "uid": "975097e3-b42a-4f6f-bab3-2c6e8ff9a2c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:55Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "7056",
                "uid": "a4f0f8e2-79de-4f50-9382-1be708ab9343"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:20Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6721",
                "uid": "cf7decbe-d4fd-4c56-aed4-a79637e164f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:30Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6857",
                "uid": "b86ed77b-abad-434e-b999-46ae12945cd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:57Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "7065",
                "uid": "46607377-ca94-4ca9-933e-96d5936f6762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:42Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6946",
                "uid": "0e89f60e-be97-4b42-b67e-0cc36c0ad801"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6916",
                "uid": "ef6f1f15-7189-4301-a3ba-1e68f578db2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6680",
                "uid": "5bdd863b-2ae7-4533-9589-324114640d01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6943",
                "uid": "780825fc-567f-407b-9f6c-34ab3e679a84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:31Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6869",
                "uid": "e32cdb07-4620-47d7-a602-9e0bff8d7876"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:35Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6901",
                "uid": "fa93661c-08e3-4b99-b617-f0c20b48a49d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6985",
                "uid": "0e1f67aa-460a-4c24-88b3-1df7fb31fb32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:47Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6978",
                "uid": "39d1d378-ad1a-417d-bb29-6ed88deb70d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6813",
                "uid": "b5b41e17-96c0-4438-a43b-06c1d7aaa611"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6829",
                "uid": "d7f8d8b1-4e7d-4f23-a7d1-1cf5577d9681"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:27Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6831",
                "uid": "d61fa9b6-5be8-4804-8013-98e68a11664d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6790",
                "uid": "24f5d04a-fbc9-479f-9419-c3d68f29d0a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:24Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6793",
                "uid": "fa6ca1e6-347e-4d20-b068-02d8613af31e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "openshift-operators-redhat-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6578",
                "uid": "54630d77-efad-46ee-b00a-a8962408d39c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:13Z",
                "name": "openshift-operators-redhat:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6583",
                "uid": "37b499fa-b3e3-4720-8421-edf73b305ca4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "system:deployers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6572",
                "uid": "f8dd0b1d-0f9a-41bf-af5b-e162d5ed94bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6573",
                "uid": "d0f974a0-d079-47fe-8fba-091a9b85d78d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:18:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6570",
                "uid": "71cf3376-7f72-4eaa-898b-7f79f66e0dda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:10Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6501",
                "uid": "97e461bb-d0ea-4807-a97b-85d92d793f09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6763",
                "uid": "942a2128-aafc-4eb1-a03a-0ba1df03d3a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5399",
                "uid": "a9c06333-c719-4eb9-ab30-261423d0ccad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6449",
                "uid": "9329c4b7-b36e-49b6-84e8-01189c25616d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6001",
                "uid": "a1e01fcf-12ab-446b-a76b-96ebf4784803"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5945",
                "uid": "bef1a324-99c4-47c7-9752-58da9bb58514"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6710",
                "uid": "cd0dca60-4c85-45b8-a7a8-fdd93d745741"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5806",
                "uid": "5ad6c8b8-9c8b-4f64-ac6e-8a71f0628fe9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5366",
                "uid": "aa35e87b-55f8-4c68-b7fb-87b7bf7fcaba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5495",
                "uid": "b71f1b66-1957-47a3-a354-c2fecff39463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:54Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6091",
                "uid": "3bea7785-551c-4864-b080-c38fd13a7a7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6152",
                "uid": "7a990d01-fd4e-455e-bd61-2648e7554e27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5127",
                "uid": "fbd61e12-dbaf-4f8d-9d2c-ddcacfc852bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5313",
                "uid": "080aee87-bdb0-4e33-ba52-bde8917fe354"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5315",
                "uid": "f338ba82-e182-4e5e-8222-28a54ec89d81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5232",
                "uid": "e470e02e-d58f-4655-9cf2-8c5d70bca9e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5239",
                "uid": "e2e64b82-9dea-4970-8080-fc2ea2630468"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:13Z",
                "name": "dedicated-admins-openshift-operators",
                "namespace": "openshift-operators",
                "resourceVersion": "5117",
                "uid": "b6b27d61-d01d-494e-ac5d-7d490566e7ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-operators"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:16Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "6KhHPV4xyDt614G88n3r92FxOjlGE53yyaLtC",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-5yq98q77b9Ijrzm2ucW0rzIgBCWF42EnzNx6WI",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "openshift-gitops-operator.v1.15.4",
                        "uid": "3a516974-a444-4bb5-a1a4-5a3664d8277e"
                    }
                ],
                "resourceVersion": "18372",
                "uid": "19be32e5-97be-4066-b39a-de818a893044"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operato-5yq98q77b9Ijrzm2ucW0rzIgBCWF42EnzNx6WI"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:18Z",
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-controller-manager-service-cert",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "openshift-gitops-operator.v1.15.4",
                        "uid": "3a516974-a444-4bb5-a1a4-5a3664d8277e"
                    }
                ],
                "resourceVersion": "18394",
                "uid": "e95c0f64-836c-4c30-948b-a9871dec1de7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator-controller-manager-service-cert"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:15Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator-prometheus",
                "namespace": "openshift-operators",
                "resourceVersion": "17075",
                "uid": "f3fc46aa-7625-45b4-a5bf-e1609bee59b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator-prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:36:11Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator.v1.15.4",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-gitops-operator.v1.15.4",
                        "uid": "3a9dee9e-0536-44d0-b58a-242a2cd7f404"
                    }
                ],
                "resourceVersion": "16934",
                "uid": "c5b3b2e0-8cb5-4b28-8d0f-ce339b9fd44b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator.v1.15.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:41:01Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-prometheus-k8s-read-binding",
                "namespace": "openshift-operators",
                "resourceVersion": "31015",
                "uid": "dcae8a64-c2a9-444f-919f-858eaee54fa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:56Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-rh.v5.0.5-806",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-pipelines-operator-rh.v5.0.5-806",
                        "uid": "586a2c3f-70bd-46f6-bcd3-6f8830500b4f"
                    }
                ],
                "resourceVersion": "30773",
                "uid": "0654f227-9cf0-407d-91f8-f1d47c48a124"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-rh.v5.0.5-806"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-operators",
                "resourceVersion": "3147",
                "uid": "c3e67eeb-bac1-4f6b-9fd9-7b2f78b59b4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators",
                "resourceVersion": "3165",
                "uid": "d9bbc0c1-69f3-493d-a68f-ce1004356430"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators",
                "resourceVersion": "3148",
                "uid": "f5aecd33-8518-43db-ab1b-d759ba1abd0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:59Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "olm.managed": "true"
                },
                "name": "tekton-operator-info",
                "namespace": "openshift-operators",
                "resourceVersion": "30923",
                "uid": "181604c7-e3fc-4363-83ce-38da68ed838c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6479",
                "uid": "9db1912b-a373-4b23-9bd8-69a34738ec47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6675",
                "uid": "7216811d-c446-479b-8e8d-2e9e95c6e988"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:18Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5261",
                "uid": "8750eb80-2e4e-4108-9688-4190b163ceae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6453",
                "uid": "d5161334-df14-4011-96e1-0782769ede63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:52Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6059",
                "uid": "3fc112fa-e076-4fe2-a287-c3178c5c547f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:42Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5878",
                "uid": "7eda9169-0db4-48ef-ac24-8c4ff00f699a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6787",
                "uid": "5caa8e59-34ca-487a-83f0-2a0cdb390a8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:39Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5829",
                "uid": "d452f861-c64c-45ea-a5de-9ada2af299d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:22Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5335",
                "uid": "a40c3169-e9e2-4700-a488-e3f6194f5962"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5496",
                "uid": "e8729ed3-ba6b-471c-88f3-c015931ca798"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5984",
                "uid": "4cf77204-4d40-4b47-8a5d-18ceb7937b31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:05Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6383",
                "uid": "a919741e-7139-488c-910f-59174902ddf6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5286",
                "uid": "3544a6c8-766d-4d93-91f0-f449fc38b8f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:46Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3687",
                "uid": "0938ea63-a282-43f9-b4b0-fc881dc60df9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:44Z",
                "name": "openshift-ovn-kubernetes-nodes-identity-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3656",
                "uid": "2e8dc07e-51c7-418d-a52f-a3ad7c3162c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:49Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "af27f7bc-c059-421f-8c78-4183f08eccba"
                    }
                ],
                "resourceVersion": "3714",
                "uid": "68f6bd40-1bc9-4162-b5f8-fa27703d3378"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:42Z",
                "name": "system:deployers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3579",
                "uid": "85e8aef9-9600-4c6b-a676-f0cf1297047d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:42Z",
                "name": "system:image-builders",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3573",
                "uid": "2167d876-d91b-4377-b5a8-5c0daaf999e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:42Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3580",
                "uid": "a8932407-da9e-475b-8dfd-fee2e4dcb496"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6316",
                "uid": "ed9a8292-0492-4afb-b570-15c7779ae89a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:19Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6706",
                "uid": "ad92f43b-27f6-46c3-9109-a9ba37120f87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:23Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5351",
                "uid": "0c2ed069-b981-4f9b-96c7-7b9bd2b4113f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6533",
                "uid": "5b5ce59d-4b3a-4394-832e-70d5cace6ac8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6079",
                "uid": "01a8e23e-b3fa-4cd6-b964-6b8c9b4a4e5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:37Z",
                "name": "backplane-lpsre-package-operator-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5780",
                "uid": "1855671a-628f-40a6-a60a-21007e70ade5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:43Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5903",
                "uid": "4c0797fb-4093-42c6-a744-3a613886d5c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6771",
                "uid": "5060999c-99a4-445a-960f-94c60a7055ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5931",
                "uid": "ddf2198f-5426-4de9-b733-1aed74783a5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:21Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5324",
                "uid": "0226173f-e153-4692-8a0a-bd0b30beb5a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5417",
                "uid": "c73f7747-db0e-4e59-a28c-9e6056518e5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6027",
                "uid": "618d1b09-dd7a-4568-aff5-71ffc6d48b41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6321",
                "uid": "ae8497de-834a-4e32-8fcc-941a96730f88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5181",
                "uid": "89777210-8375-476e-82c1-0c18a21ba8de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:53Z",
                "name": "system:deployers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4624",
                "uid": "f2eed324-d7b1-49a0-b965-932619cf85d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:53Z",
                "name": "system:image-builders",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4622",
                "uid": "ef7724e7-9637-4362-a972-518174a43635"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:15:53Z",
                "name": "system:image-pullers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4623",
                "uid": "00e754d6-55ad-4074-8d2a-98b7478bac1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:50Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27796",
                "uid": "49da3ae3-7f45-44b3-807a-337c36970190"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "28664",
                "uid": "1d762fc7-546c-4836-b1f5-a5fda4560fe0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "28506",
                "uid": "28bc0f33-3b64-42a2-abd7-b8634a93a653"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27671",
                "uid": "bb1e2c19-527d-43d6-a13a-28e3bacaed9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:04Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "28374",
                "uid": "9ee1542b-2615-4819-a5a9-b0a4f12a8a53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:37Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27488",
                "uid": "f8f0c3af-e06f-4927-95fa-849d0b8393bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:52Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27835",
                "uid": "5cd8b953-94e0-477b-8562-e61d6938531a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27659",
                "uid": "1789da52-e42d-44f5-8865-fa78ac3eebfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:38Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27557",
                "uid": "28d14652-9967-45f6-8b26-7c0ad6d8dade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:47Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27681",
                "uid": "81e76a83-2c77-4af8-884a-2b95089f0380"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:58Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "28180",
                "uid": "c2cf7af1-b5f1-4497-88dc-a0d2bacb9f08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27938",
                "uid": "c89b5af0-e11b-4bcb-86a5-cc358bef3958"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "28318",
                "uid": "8044e730-2124-4939-847c-3c8a64e4c12b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:openshift-pipelines/chains-secret-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:openshift-pipelines/chains-secret-admin\"},\"name\":\"chains-secret-admin\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"chains-secret-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"chains-secrets-admin\",\"namespace\":\"openshift-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "name": "chains-secret-admin",
                "namespace": "openshift-pipelines",
                "resourceVersion": "29282",
                "uid": "8a2139b4-af36-4131-a1e8-346607ef31d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "chains-secret-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "chains-secrets-admin",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-application-controller",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27248",
                "uid": "4880dffe-24f7-4d7e-8a8c-15c129d4f859"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-server",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27249",
                "uid": "39e27621-ceb9-4349-b066-3eff274d19c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "8233dee3631b4c198b5cddde81b966ee0b5e0cc759d0564e80e0bf6d482039a2",
                    "operator.tekton.dev/preserve-rb-subject-namespace": "true"
                },
                "creationTimestamp": "2026-05-10T18:42:27Z",
                "name": "openshift-pipelines-prometheus-k8s-read-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-post-k5mn9",
                        "uid": "8186b94f-feae-4439-91d2-07cec9217bf1"
                    }
                ],
                "resourceVersion": "34385",
                "uid": "2d369d87-7475-4d4c-8afb-e1008f21fff1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:openshift-pipelines/pipeline-service-sre-ns-edit",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:openshift-pipelines/pipeline-service-sre-ns-edit\"},\"name\":\"pipeline-service-sre-ns-edit\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"edit\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-pipeline-service\"},{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-sre\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "name": "pipeline-service-sre-ns-edit",
                "namespace": "openshift-pipelines",
                "resourceVersion": "29283",
                "uid": "1fdcaad7-4630-410f-849b-f7578e55928b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-pipeline-service"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-sre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "440f52cb3cfb2959fac188003b8e3dd922019cbb7e684ad08019e718643117a0"
                },
                "creationTimestamp": "2026-05-10T18:43:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-bhtzf",
                        "uid": "d64f9ed5-3755-4145-bec2-83c6c3bde57f"
                    }
                ],
                "resourceVersion": "37762",
                "uid": "85415da8-71cc-47cc-ae61-46adf2334120"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2a79773792c497639eefac937fba8322a1ebed090a5feb06e11b2df7a62becc5"
                },
                "creationTimestamp": "2026-05-10T18:43:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0"
                },
                "name": "pipelines-as-code-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-bhtzf",
                        "uid": "d64f9ed5-3755-4145-bec2-83c6c3bde57f"
                    }
                ],
                "resourceVersion": "37760",
                "uid": "35b19c46-ac38-457f-9c3c-ccf1e286702c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "093fcca497dcd48b48d812b7f078153cd6aeb3e345387bd797d05bcfcc9e462e"
                },
                "creationTimestamp": "2026-05-10T18:43:52Z",
                "name": "pipelines-as-code-monitoring",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-bhtzf",
                        "uid": "d64f9ed5-3755-4145-bec2-83c6c3bde57f"
                    }
                ],
                "resourceVersion": "37771",
                "uid": "219e91a8-697a-49d9-a457-b371910cc9a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6532c2a7812fd87b8169944a896d4c703aad534e7ee882259f76f26e86683f89"
                },
                "creationTimestamp": "2026-05-10T18:43:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-bhtzf",
                        "uid": "d64f9ed5-3755-4145-bec2-83c6c3bde57f"
                    }
                ],
                "resourceVersion": "37765",
                "uid": "69285d10-45bc-45bb-9453-3686cc3b2bfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f99ded6df1bcc15c03de3c10fda63514d4b438300840a3242d94a3341c315903"
                },
                "creationTimestamp": "2026-05-10T18:43:52Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-bhtzf",
                        "uid": "d64f9ed5-3755-4145-bec2-83c6c3bde57f"
                    }
                ],
                "resourceVersion": "37769",
                "uid": "21076196-4ae2-4a48-8e2d-f1713f894d9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "system:deployers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27235",
                "uid": "6c815416-071f-4a6d-97d5-02a1d4cb2188"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "system:image-builders",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27237",
                "uid": "12992a9b-7cf4-4601-a6f7-9165b627d338"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "system:image-pullers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "27236",
                "uid": "d5c68358-fa63-474c-8d86-e93cfcb6cf1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "726a5b478d46f635fb13bc3f7d88ed924d6af449a0deb11d3695d756edaf53c0"
                },
                "creationTimestamp": "2026-05-10T18:42:45Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-t5q4z",
                        "uid": "d4e155f3-8f08-41d9-9fd7-09c3989b085b"
                    }
                ],
                "resourceVersion": "35336",
                "uid": "4fc75eb2-64d1-435f-825b-046d7e0d866f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "fe048973f29ad278df2ecc9684e3dba43bab2ac14ab2ae437725b1ecd0322f57"
                },
                "creationTimestamp": "2026-05-10T18:42:45Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-t5q4z",
                        "uid": "d4e155f3-8f08-41d9-9fd7-09c3989b085b"
                    }
                ],
                "resourceVersion": "35341",
                "uid": "bd2374ed-1c59-410f-9b0e-efcf2d873fc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:openshift-pipelines/tekton-chains-public-key-viewer",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:openshift-pipelines/tekton-chains-public-key-viewer\"},\"name\":\"tekton-chains-public-key-viewer\",\"namespace\":\"openshift-pipelines\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-chains-public-key-viewer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "name": "tekton-chains-public-key-viewer",
                "namespace": "openshift-pipelines",
                "resourceVersion": "29280",
                "uid": "c5b49189-4ad6-4423-b430-71531086a574"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-public-key-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0fff613592cc043d3e58b6b96a541c4b5c6d11f028c557c4f3e3484bae2f8285"
                },
                "creationTimestamp": "2026-05-10T18:42:57Z",
                "name": "tekton-default-openshift-pipelines-view",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-rrhsn",
                        "uid": "9b692bd0-be80-4dfd-8f88-339eb172f68b"
                    }
                ],
                "resourceVersion": "35899",
                "uid": "1c5c7e05-fd8d-4c77-93c8-7a34076fb199"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-default-openshift-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"2a7d90e2d58006b3975ee37ac0f31b8b43f9e744c246221d8d24a20ad76f5f00\"},\"name\":\"tekton-ecosystem-stepaction-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolverstepactions-5.0-q8twl\",\"uid\":\"070d69e8-ef05-4e19-975d-a8e2a244f7cf\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-stepaction-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "2a7d90e2d58006b3975ee37ac0f31b8b43f9e744c246221d8d24a20ad76f5f00"
                },
                "creationTimestamp": "2026-05-10T18:42:55Z",
                "name": "tekton-ecosystem-stepaction-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolverstepactions-5.0-q8twl",
                        "uid": "070d69e8-ef05-4e19-975d-a8e2a244f7cf"
                    }
                ],
                "resourceVersion": "35958",
                "uid": "33d6366e-98d6-4784-9143-0ef5811544f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-stepaction-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"c39b8109637be88240201f73483be1f67861b62fee2818150a283bfd2fdd6137\"},\"name\":\"tekton-ecosystem-task-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolvertasks-5.0-mfh8x\",\"uid\":\"bb088268-42b6-40e7-b5e5-80e806cc8331\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-task-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "c39b8109637be88240201f73483be1f67861b62fee2818150a283bfd2fdd6137"
                },
                "creationTimestamp": "2026-05-10T18:42:54Z",
                "name": "tekton-ecosystem-task-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolvertasks-5.0-mfh8x",
                        "uid": "bb088268-42b6-40e7-b5e5-80e806cc8331"
                    }
                ],
                "resourceVersion": "35960",
                "uid": "dacee539-fb80-4f52-9c09-31329522bd5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-task-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a73b579677d7dc11a670120c404d3e30edb49e84ce42bac5bea937d722b72ea8"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "33002",
                "uid": "d4c980fd-55b8-48b1-ad88-1e399a77ffe6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1f661166c8446cc83ac7d537fdc968984b6ae9e73056b00b6a356be1d1ce4620"
                },
                "creationTimestamp": "2026-05-10T18:41:45Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "33010",
                "uid": "bc198985-1c17-47ee-b216-e62212213b9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "da72451eb6c6eb7f8dbbf4199a8f7c6eb7ad8a1552b7c35bbb7826ab024db169"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "32983",
                "uid": "65c08de3-3b10-4e6b-ae75-c7f5f47ec1c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0d655fe5e74b1490fe95ca72254b05c2d966a62d347fe2500ccad6e4f834d1f7"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "32989",
                "uid": "cc1093f0-5dfd-41f7-89da-179589a0a2d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7f1f67201c5c9cc1e82206047d9fd1a8f2f8627f2162623774623468d754de30"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "32999",
                "uid": "8a1558c5-2bed-47c0-8722-f685b3a82cc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "63e94badbe63688ae84990482736fff60224a934338bba4a37da613af7b27f69"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "32995",
                "uid": "e33e4346-8f3c-4ef1-b9d6-fe78df9ba286"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e83042067fc6b00f200e26afaee9ba2040d48e331e043907c1f2bf4ae2b1abe7"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "33009",
                "uid": "534b52a7-43be-4a2e-855c-17a19b67b4e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "29e42c393e0cd64e98b8560451237fe4afc00c0704f87cfcad5e22bb86dfc56b"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "32987",
                "uid": "8ea04d90-4470-4265-9464-4a4c42a63b96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0aa8e97c2857b1c4a4df263f757e957a0c4a16d33b3baa61f88aecba4811634d"
                },
                "creationTimestamp": "2026-05-10T18:41:44Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-slpqr",
                        "uid": "c1cc7bec-0ba0-405b-9b43-759af830f021"
                    }
                ],
                "resourceVersion": "32993",
                "uid": "0a574d82-5951-43a4-8f0e-e1e53bf8ac7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "fbd99c9f813034667bba65c81470099bb0e9a6d64ec2b94c0346c705a19f7b51"
                },
                "creationTimestamp": "2026-05-10T18:42:31Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-fdjg7",
                        "uid": "e703d83f-ee05-4469-86da-b73135ee2974"
                    }
                ],
                "resourceVersion": "34580",
                "uid": "9111079f-37b2-49b4-8476-329c23e5c868"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4b90dd8d80bdc492a4f295a0edb5fbc05656c48a1e9bfd7aa594a625cf50d841"
                },
                "creationTimestamp": "2026-05-10T18:42:31Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-fdjg7",
                        "uid": "e703d83f-ee05-4469-86da-b73135ee2974"
                    }
                ],
                "resourceVersion": "34587",
                "uid": "76f440f9-ba19-4c4c-8278-d31271056564"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9b305b9a08280fa9a032058982af67da661fd01958d49f7d421d5245803d1698"
                },
                "creationTimestamp": "2026-05-10T18:42:31Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-fdjg7",
                        "uid": "e703d83f-ee05-4469-86da-b73135ee2974"
                    }
                ],
                "resourceVersion": "34576",
                "uid": "15d879be-770b-410e-9252-c5cb076f2bfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6481",
                "uid": "e317aeaf-e7b2-4cbe-84b4-cfcaa961f469"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:26Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6823",
                "uid": "399d8679-7503-47da-9367-ba4890dcc7a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5403",
                "uid": "669e0c9e-e8ee-4213-9aad-ca7b0f043e7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6455",
                "uid": "1ea3c6d2-6a51-4e30-ae7e-984f21216629"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:53Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6082",
                "uid": "55a71f1d-4a0a-4ef0-8ba4-92ee571cc223"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5868",
                "uid": "d8d274cf-c7ca-4f3d-b024-a3b3a4aaa34a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:15Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6629",
                "uid": "99968c12-4167-4915-bf36-82f90879cc5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5865",
                "uid": "b12982e5-9d15-4a26-ab6d-5ce6de8cb050"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5381",
                "uid": "3d712b4a-5f5e-4acf-9839-c7fe0f215b51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5518",
                "uid": "9c044756-4e46-4b3d-b860-117f406f1354"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6039",
                "uid": "d6da975d-16ec-4a7b-9866-45ec2971bb44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6277",
                "uid": "ebd5cc17-d69c-434c-b8cf-78a1be07053c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5309",
                "uid": "d1c8ae3f-e7e3-4b3f-ba48-8446195bb8e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:14:22Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "openshift-route-controllers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "1526",
                "uid": "328635d3-6ab7-4f5b-939f-bd793713f444"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-route-controllers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "3150",
                "uid": "406b8972-9467-4eb5-bac0-7bfc93639cac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "3149",
                "uid": "e852e539-693b-4c4f-a6b3-9825d3da7f61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "3184",
                "uid": "8c52e52e-57d2-4941-a030-a74c8b0ee08b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:00Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6275",
                "uid": "34ab0ca2-abf2-4db1-8e73-625ffaae9881"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:25Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6812",
                "uid": "620136a2-1f8b-466d-8c8a-eecba70091a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:20Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5306",
                "uid": "dc063a6a-8c88-4035-931b-93adc88437c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:16Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6636",
                "uid": "94361478-be4a-4043-9e02-117e43515feb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:51Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6050",
                "uid": "7fafda1f-6c2c-4bdc-b381-87d896428aa2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5836",
                "uid": "8da17b94-17f2-4357-a8eb-f63c9962e2df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6772",
                "uid": "e4f73883-5d6c-4fac-9c50-a52392d7314f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5919",
                "uid": "4dfb195e-b695-42bd-9579-2775ccc91503"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:29Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5475",
                "uid": "6d300310-dd30-4d0f-bbb4-f79399aaa420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5498",
                "uid": "895c87b3-ef04-4159-a07c-96f2254ae059"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:55Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6111",
                "uid": "a04ee588-a2de-4bae-b331-135d656f316c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6323",
                "uid": "08986189-ddb0-4139-8dbf-54a56b82de7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:15Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5213",
                "uid": "b6cd604b-97a5-43b7-8f27-7d96c5e3a784"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:11Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "998",
                "uid": "5f48aedf-7f83-416d-9dfc-cb6fcfd80ac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "3167",
                "uid": "0a6a4fd7-9076-4995-8d4d-09ff2c33186e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "3166",
                "uid": "f282d2b5-cf61-490f-ba57-ab3638df66e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "3186",
                "uid": "cbe4abc7-6665-4725-ba14-3abf3a3646b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:58Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10617",
                "uid": "a9ef9ffe-eb81-49d7-9d62-f71eefea5ea6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:50Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10357",
                "uid": "0fa91f77-3dd4-45d0-9e88-eebed96b298a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:51Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10394",
                "uid": "e7a443d0-f09a-41ca-96da-e0cb88455bb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:49Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10323",
                "uid": "0d490289-125f-4f15-af3b-f6bffe1bbe28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:14Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11176",
                "uid": "98a01c51-6a8d-453a-9d37-9a6d09ee8179"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:15Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11214",
                "uid": "aacd96d1-cee9-4a13-9b42-3259e17a0589"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10783",
                "uid": "76c1aea8-c306-46b7-bf83-bce8d6f70dda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:59Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10627",
                "uid": "4a83dc98-e159-464c-a929-9f72b1eaf27b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10545",
                "uid": "737e5cbc-2f65-4b89-a7b0-91abfc77501f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:10Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10872",
                "uid": "a1c4a15c-cc4c-4d0e-ab8a-cf48a66795e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:19Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11480",
                "uid": "0d92a2f8-e27d-4881-b8a2-1ba67cb59a77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:06Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10802",
                "uid": "920b463d-4f80-4bc5-881f-1c4d2296cd42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11049",
                "uid": "4331ebd2-a65c-4a73-aea9-0f383b5d8e68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:24:47Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10198",
                "uid": "2d83a7ec-f5f3-4729-ae3c-b6330b312a6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:24:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10186",
                "uid": "f464c20d-14b5-45ba-9aa6-a7719bf12eaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:24:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10197",
                "uid": "169ce954-e0b4-4443-af3e-64fc3f88b818"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:24:47Z",
                "name": "system:openshift:controller:service-ca",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10185",
                "uid": "f8f4b60b-2458-41dd-a6ee-fec94bdfefea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:15Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-user-workload-prometheususer-workload",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "20504",
                "uid": "4c48bf4a-0eb4-4c42-97f3-3825b3bf36d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-api-writer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-user-workload",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:08Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6462",
                "uid": "0d9e34d3-94e1-4f1f-b426-c28a8091d7ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:17Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6652",
                "uid": "6d09628a-9e98-48be-bf44-e2ce0df4799e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:19Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5279",
                "uid": "a48f0f4c-dfcd-4942-955e-9f8bc9d60b55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6477",
                "uid": "e7d9a1df-6618-43c4-8568-eaed582ba774"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5976",
                "uid": "d1fdb8d7-1fdb-451d-99fb-390242bd3fae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:41Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5856",
                "uid": "0f1adc06-a727-409f-90d4-7b85fe7edc14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:14Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6607",
                "uid": "50e65afc-22c7-4d4d-8435-3dbff5e63f4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5968",
                "uid": "299df441-14fb-402b-969d-4f0b6ffe9ec5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:26Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5412",
                "uid": "5dd4263e-999c-4e39-a248-b9779401cccb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:28Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5453",
                "uid": "3964b6ee-0e95-4846-978e-cc3dd65f504b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6009",
                "uid": "b74829a6-0994-4cf9-b1af-4a8aca14a2b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6198",
                "uid": "a8cf5333-3c41-47c9-902a-62a8313870f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:16Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5222",
                "uid": "a344f6b8-cb1a-4434-93a7-4a92fa19408b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:23Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-user-workload-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1652",
                "uid": "c815f035-8c4a-41ac-bbab-9ef3f45e39ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "dedicated-admins-uwm-config-create",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6191",
                "uid": "41d32783-e4b1-4b41-b556-2ebedcee5807"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-create-cm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:58Z",
                "name": "dedicated-admins-uwm-config-edit",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6183",
                "uid": "49e64f5b-447d-4217-83c3-684f7e5ec0fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "user-workload-monitoring-config-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:59Z",
                "name": "dedicated-admins-uwm-managed-am-secret",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6197",
                "uid": "dc1311a8-761d-46cf-ad45-60f57e292c25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-manage-am-secret"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:25:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "11950",
                "uid": "9aba4363-e618-4129-b4e3-a063c690f69f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:15Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "user-workload",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-user-workload",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "20537",
                "uid": "dd36ad35-ecbe-4d4b-b60b-8a9389bf0b0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-user-workload"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-user-workload",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:16Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "user-workload",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-user-workload-config",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "20551",
                "uid": "7134bed7-f403-4b77-921a-86046afd7783"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-user-workload-config"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-user-workload",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:deployers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "3182",
                "uid": "a0ed0f6b-e011-44b2-8202-823573011936"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "3187",
                "uid": "af6ba8d3-ca0e-4025-b7ab-52c2a87ca9fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "3180",
                "uid": "91857c55-cf79-4653-99a4-5e7841ad3914"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:16Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "user-workload-alertmanager-thanos-ruler",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "20562",
                "uid": "ec35bb11-9da9-447a-a374-4d179a1c1cdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-api-writer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-ruler",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:02Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift",
                "resourceVersion": "6319",
                "uid": "8cb8e8d9-f4d4-4434-8a74-612af0cc7207"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-cee-0",
                "namespace": "openshift",
                "resourceVersion": "6784",
                "uid": "b76f83e6-4a21-4e9c-8873-b038d616be25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:24Z",
                "name": "backplane-cse-0",
                "namespace": "openshift",
                "resourceVersion": "5371",
                "uid": "7a1d1b34-8dc4-4e41-a4d8-a5779dd6c022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift",
                "resourceVersion": "6442",
                "uid": "430adc33-4bac-4328-b1ae-8f8b15842245"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:47Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift",
                "resourceVersion": "5978",
                "uid": "4d9ea70f-f687-447e-9e02-5d4deb783312"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:45Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift",
                "resourceVersion": "5935",
                "uid": "b8916b11-8c89-4c3c-a1db-5e30de2256cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:18:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift",
                "resourceVersion": "6773",
                "uid": "204b364e-83e7-4756-ad0b-d379c70f4087"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift",
                "resourceVersion": "5833",
                "uid": "b66320db-6f22-4c12-a4ca-b313bfeff07b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:25Z",
                "name": "backplane-srep-0",
                "namespace": "openshift",
                "resourceVersion": "5397",
                "uid": "5e450010-5178-4584-8a59-7168c4ee5c26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:30Z",
                "name": "backplane-srep-1",
                "namespace": "openshift",
                "resourceVersion": "5506",
                "uid": "d65c87ed-f7a7-4b99-9c47-d0f45a9107b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift",
                "resourceVersion": "6019",
                "uid": "0c187c6a-699e-456a-8c0b-eed053515a34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift",
                "resourceVersion": "6162",
                "uid": "04869c60-ece3-44a4-b62d-14c074a5a18d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:17:14Z",
                "name": "backplane-tam-0",
                "namespace": "openshift",
                "resourceVersion": "5187",
                "uid": "539e2c0f-7858-4320-93f9-88acc1669b0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "cluster-samples-operator-openshift-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1760",
                "uid": "64f99885-2023-46c3-8ffd-9f991ac915d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "OperatorLifecycleManager",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:14:24Z",
                "name": "copied-csv-viewers",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "3b395dc9-1965-4fdd-a20a-25e1e7868562"
                    }
                ],
                "resourceVersion": "1716",
                "uid": "d775beab-3e47-40de-805a-add38af5b927"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "copied-csv-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "891248770f6dee4eee869fc2a93de219d45eeeed2925e6d3a3a6dbc06138b571"
                },
                "creationTimestamp": "2026-05-10T18:44:05Z",
                "labels": {
                    "app.kubernetes.io/part-of": "pipelines-as-code"
                },
                "name": "pipelines-as-code-templates",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-post-t5pzr",
                        "uid": "93048ce8-2d32-4a2e-86fe-b6233f24177d"
                    }
                ],
                "resourceVersion": "38121",
                "uid": "3e8493a2-0d15-4a30-b3aa-9a60e951fb6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-templates"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-10T18:13:41Z",
                "name": "shared-resource-viewers",
                "namespace": "openshift",
                "resourceVersion": "462",
                "uid": "0684e2f7-7acc-4643-87af-e1cafc18256d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "shared-resource-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:deployers",
                "namespace": "openshift",
                "resourceVersion": "2381",
                "uid": "3b1633d7-6135-4a01-b05b-05e0b934fe7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:33Z",
                "name": "system:image-builders",
                "namespace": "openshift",
                "resourceVersion": "2315",
                "uid": "e195c64e-206b-4177-b940-2997d6a9f08f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:14:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift",
                "resourceVersion": "2386",
                "uid": "5eb75f99-cf33-4069-a0e1-7da833cdf030"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "495aa74e1590ee485ed06fa47db4ef312d3d07fae7cd8caf456a4bf7c5e538cd",
                    "operator.tekton.dev/preserve-namespace": "true"
                },
                "creationTimestamp": "2026-05-10T18:42:57Z",
                "name": "tekton-default-pipelines-view",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-rrhsn",
                        "uid": "9b692bd0-be80-4dfd-8f88-339eb172f68b"
                    }
                ],
                "resourceVersion": "35883",
                "uid": "0ab112ae-c8c0-498f-80e1-ac447e5a63d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-default-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:40Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "23032",
                "uid": "670e4202-f48f-480f-932a-9d25fd4c6d0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "23439",
                "uid": "19b0fff5-fd63-4c3c-9f08-b6e63ff4a4ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "23243",
                "uid": "89c71fc6-8c4b-4443-9972-339792232c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-1",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "23268",
                "uid": "a3fe92d4-4538-4f51-a898-d3eb7a9e4523"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:47Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "23545",
                "uid": "afa53ca2-bda0-4580-bf6b-088de899c5f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:perf-team-prometheus-reader/perf-team-prometheus-reader-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:perf-team-prometheus-reader/perf-team-prometheus-reader-maintainers\"},\"name\":\"perf-team-prometheus-reader-maintainers\",\"namespace\":\"perf-team-prometheus-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-performance\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:16Z",
                "name": "perf-team-prometheus-reader-maintainers",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "26067",
                "uid": "7ba7f5bc-f7b8-4cfe-b3c1-3c2df1b389b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-performance"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:25Z",
                "name": "system:deployers",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "21728",
                "uid": "1e918b9f-70f7-41b4-8dd8-be993870330d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:25Z",
                "name": "system:image-builders",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "21730",
                "uid": "b564fbae-2842-448a-a092-055bb4019a9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:25Z",
                "name": "system:image-pullers",
                "namespace": "perf-team-prometheus-reader",
                "resourceVersion": "21729",
                "uid": "e07df81b-f472-466a-848b-aa91fcde0e60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:41Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18903",
                "uid": "2cb4f581-a048-4131-a265-9f9e3116df28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18911",
                "uid": "30067a11-7a7c-4f2e-bfea-2d16de0520b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:41Z",
                "name": "dedicated-admins-0",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18902",
                "uid": "c1f17025-7d79-47ec-a958-88a9c2c35ecb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admins-1",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18906",
                "uid": "dd40517b-a1ea-4214-a4fe-a4e754088bac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:42Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18912",
                "uid": "36114267-9ec2-4c7f-aaf7-40d85331f744"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive-logging/grafana",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive-logging/grafana\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/instance\":\"grafana\",\"app.kubernetes.io/name\":\"grafana\",\"app.kubernetes.io/version\":\"12.4.3\",\"helm.sh/chart\":\"grafana-11.6.1\"},\"name\":\"grafana\",\"namespace\":\"product-kubearchive-logging\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"grafana\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"grafana\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:42:38Z",
                "labels": {
                    "app.kubernetes.io/instance": "grafana",
                    "app.kubernetes.io/name": "grafana",
                    "app.kubernetes.io/version": "12.4.3",
                    "helm.sh/chart": "grafana-11.6.1"
                },
                "name": "grafana",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "34873",
                "uid": "e041e8d7-2a94-402c-9748-ab788729d29e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "grafana"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "grafana",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive-logging/kubearchive-logging-admin",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive-logging/kubearchive-logging-admin\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"kubearchive-logging-admin\",\"namespace\":\"product-kubearchive-logging\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:37Z",
                "name": "kubearchive-logging-admin",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "27544",
                "uid": "05d534a5-d418-4eb9-9c9e-b7416f6ee0c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive-logging/kubearchive-logging-component-maintainers",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive-logging/kubearchive-logging-component-maintainers\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"kubearchive-logging-component-maintainers\",\"namespace\":\"product-kubearchive-logging\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:37Z",
                "name": "kubearchive-logging-component-maintainers",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "27546",
                "uid": "ff780c46-f9ff-4e5d-ba44-089eccbd7540"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:38Z",
                "name": "system:deployers",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18888",
                "uid": "6accdeb0-4c74-4abc-83da-2a0db46ff249"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:38Z",
                "name": "system:image-builders",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18889",
                "uid": "ac9fc8f2-2305-442b-bb40-b7aaa0ef66fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:38Z",
                "name": "system:image-pullers",
                "namespace": "product-kubearchive-logging",
                "resourceVersion": "18887",
                "uid": "141e5e6c-b33b-4830-a871-4d0baac4d07f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "product-kubearchive",
                "resourceVersion": "16744",
                "uid": "db2ed9c5-00d2-4ebb-ad07-68c5a1b1fbd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "product-kubearchive",
                "resourceVersion": "16736",
                "uid": "cc65489b-9d52-4b6b-914c-1c9b2950c69f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admins-0",
                "namespace": "product-kubearchive",
                "resourceVersion": "16727",
                "uid": "36f519f9-51fd-4bad-aeca-84c069f058c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admins-1",
                "namespace": "product-kubearchive",
                "resourceVersion": "16726",
                "uid": "f33cd320-8aa2-422d-a9c5-c85cd1646b1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "product-kubearchive",
                "resourceVersion": "16737",
                "uid": "bcc651f6-3e4f-48a6-b0e6-d4e4831b0e0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-admin\"},\"name\":\"kubearchive-admin\",\"namespace\":\"product-kubearchive\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:37Z",
                "name": "kubearchive-admin",
                "namespace": "product-kubearchive",
                "resourceVersion": "29829",
                "uid": "6db58709-3290-4d34-9b3f-2890886ef17b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-api-url-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-api-url-reader\"},\"name\":\"kubearchive-api-url-reader\",\"namespace\":\"product-kubearchive\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"kubearchive-api-url-reader\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:37Z",
                "name": "kubearchive-api-url-reader",
                "namespace": "product-kubearchive",
                "resourceVersion": "29838",
                "uid": "898cc917-a4ed-4dfd-b005-b860f674a7ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-api-url-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-component-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-component-maintainers\"},\"name\":\"kubearchive-component-maintainers\",\"namespace\":\"product-kubearchive\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"component-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:37Z",
                "name": "kubearchive-component-maintainers",
                "namespace": "product-kubearchive",
                "resourceVersion": "29830",
                "uid": "a0a9eb9c-f088-4ae9-9682-a69fed54b281"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-operator-leader-election",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-operator-leader-election\"},\"labels\":{\"app.kubernetes.io/component\":\"operator\",\"app.kubernetes.io/name\":\"kubearchive-operator-leader-election\",\"app.kubernetes.io/part-of\":\"kubearchive\",\"app.kubernetes.io/version\":\"v1.21.3\"},\"name\":\"kubearchive-operator-leader-election\",\"namespace\":\"product-kubearchive\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"kubearchive-operator-leader-election\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-operator\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:37Z",
                "labels": {
                    "app.kubernetes.io/component": "operator",
                    "app.kubernetes.io/name": "kubearchive-operator-leader-election",
                    "app.kubernetes.io/part-of": "kubearchive",
                    "app.kubernetes.io/version": "v1.21.3"
                },
                "name": "kubearchive-operator-leader-election",
                "namespace": "product-kubearchive",
                "resourceVersion": "29828",
                "uid": "55486458-786d-4f8d-8969-cd1ff1b78a1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-operator-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-operator",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-vacuum",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:product-kubearchive/kubearchive-vacuum\"},\"labels\":{\"app.kubernetes.io/component\":\"operator\",\"app.kubernetes.io/name\":\"kubearchive-vacuum\",\"app.kubernetes.io/part-of\":\"kubearchive\",\"app.kubernetes.io/version\":\"v1.21.3\"},\"name\":\"kubearchive-vacuum\",\"namespace\":\"product-kubearchive\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"kubearchive-vacuum\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-cluster-vacuum\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:37Z",
                "labels": {
                    "app.kubernetes.io/component": "operator",
                    "app.kubernetes.io/name": "kubearchive-vacuum",
                    "app.kubernetes.io/part-of": "kubearchive",
                    "app.kubernetes.io/version": "v1.21.3"
                },
                "name": "kubearchive-vacuum",
                "namespace": "product-kubearchive",
                "resourceVersion": "176041",
                "uid": "7d1f847d-006c-4dce-9d76-0aaff653c423"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr-managed"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "integration2-ilon"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-issb"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "stat-rep-aawm"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-wqht"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-ickv"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-laxo"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "chains-e2e-lydf"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "group-rvbr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-yige"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-ican"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-nlva"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-kzbb"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "rel-plan-admis-gvtd"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-moshekipod-backwards-compat-dr"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-sspn"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "gitlab-rep-sker"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-bc"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-nbyi"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "build-e2e-nllb"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "integration1-xjus"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "dr-test-kokohazamar-backwards-compat-dr-managed"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "upgrade-namespace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:28Z",
                "name": "system:deployers",
                "namespace": "product-kubearchive",
                "resourceVersion": "16703",
                "uid": "87f06bab-5454-4321-ba33-6583a42eadfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:28Z",
                "name": "system:image-builders",
                "namespace": "product-kubearchive",
                "resourceVersion": "16700",
                "uid": "18e55e98-2d04-4760-bfbc-78f7a6eb5db0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:28Z",
                "name": "system:image-pullers",
                "namespace": "product-kubearchive",
                "resourceVersion": "16702",
                "uid": "264e784a-e0ff-482a-b2b9-29cb74ebb883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "project-controller",
                "resourceVersion": "27270",
                "uid": "45ea7b1c-6d97-4a39-82d6-7a519d203fa4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "project-controller",
                "resourceVersion": "27291",
                "uid": "6615d66e-d2e7-42e4-8880-fd2625777463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admins-0",
                "namespace": "project-controller",
                "resourceVersion": "27301",
                "uid": "5a3416ca-98ad-434c-9495-f343d47e54e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "dedicated-admins-1",
                "namespace": "project-controller",
                "resourceVersion": "26561",
                "uid": "0f63c744-28e2-472e-aa84-9c350d3e2134"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:34Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "project-controller",
                "resourceVersion": "27444",
                "uid": "ce953258-6657-47a4-a1b7-85c3ebb51c9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:project-controller/grant-argocd",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:project-controller/grant-argocd\"},\"name\":\"grant-argocd\",\"namespace\":\"project-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:01Z",
                "name": "grant-argocd",
                "namespace": "project-controller",
                "resourceVersion": "24978",
                "uid": "e8de00e6-62a8-4809-9ce0-80e4d9345694"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:project-controller/project-controller-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:project-controller/project-controller-leader-election-rolebinding\"},\"labels\":{\"app.kubernetes.io/component\":\"rbac\",\"app.kubernetes.io/created-by\":\"project-controller\",\"app.kubernetes.io/instance\":\"leader-election-rolebinding\",\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"rolebinding\",\"app.kubernetes.io/part-of\":\"project-controller\"},\"name\":\"project-controller-leader-election-rolebinding\",\"namespace\":\"project-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"project-controller-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-controller-manager\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:01Z",
                "labels": {
                    "app.kubernetes.io/component": "rbac",
                    "app.kubernetes.io/created-by": "project-controller",
                    "app.kubernetes.io/instance": "leader-election-rolebinding",
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "rolebinding",
                    "app.kubernetes.io/part-of": "project-controller"
                },
                "name": "project-controller-leader-election-rolebinding",
                "namespace": "project-controller",
                "resourceVersion": "24980",
                "uid": "b9a19611-080c-4d49-bb69-7d12999a8fb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "project-controller-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-controller-manager",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:project-controller/project-controller-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:project-controller/project-controller-maintainers\"},\"name\":\"project-controller-maintainers\",\"namespace\":\"project-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-o11y\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:01Z",
                "name": "project-controller-maintainers",
                "namespace": "project-controller",
                "resourceVersion": "24977",
                "uid": "8837f117-2c74-4ee6-a9e2-a29de20d3381"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-o11y"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:50Z",
                "name": "system:deployers",
                "namespace": "project-controller",
                "resourceVersion": "24090",
                "uid": "dbaca916-69e6-47cf-8473-7068983e6322"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:50Z",
                "name": "system:image-builders",
                "namespace": "project-controller",
                "resourceVersion": "24091",
                "uid": "9c207f08-dd57-44aa-aeb1-a3edbd9e5039"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:50Z",
                "name": "system:image-pullers",
                "namespace": "project-controller",
                "resourceVersion": "24109",
                "uid": "521cf659-aa55-48f7-8e07-18ce827d2e94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "quality-dashboard",
                "resourceVersion": "18801",
                "uid": "551b4a08-7553-4953-a8cf-0d63c0c8966e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "quality-dashboard",
                "resourceVersion": "18813",
                "uid": "778a576b-7697-48a8-b946-9f16591c50b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "dedicated-admins-0",
                "namespace": "quality-dashboard",
                "resourceVersion": "18802",
                "uid": "6358c498-2c3d-494e-8f73-2ae9aec7eade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "dedicated-admins-1",
                "namespace": "quality-dashboard",
                "resourceVersion": "18816",
                "uid": "7e9c698f-9428-4120-b5db-6200e2c0a6f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "quality-dashboard",
                "resourceVersion": "18812",
                "uid": "bd552e31-8789-4ed1-a1f3-be3216bb6682"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "system:deployers",
                "namespace": "quality-dashboard",
                "resourceVersion": "18814",
                "uid": "cfcab5ef-58e1-4030-a278-f70e05ca1487"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "quality-dashboard"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "system:image-builders",
                "namespace": "quality-dashboard",
                "resourceVersion": "18815",
                "uid": "3d76dc56-9129-414b-a98b-964f961d5491"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "quality-dashboard"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:37:36Z",
                "name": "system:image-pullers",
                "namespace": "quality-dashboard",
                "resourceVersion": "18811",
                "uid": "d8e5ed18-b61b-4b42-b3ca-78ed0d23f26f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:quality-dashboard"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:07Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "54015",
                "uid": "4f5fac82-8058-4d08-b2bf-a13e1349ce0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:13Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "54561",
                "uid": "b2a73cbd-b129-4e10-8bcc-44183e261576"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:19Z",
                "name": "dedicated-admins-0",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "55360",
                "uid": "b2327d77-713f-42ee-bd5e-a56f2fb42e35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-1",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "53049",
                "uid": "efc14c68-d934-41a4-a463-6f12d5c67e09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "53028",
                "uid": "4381705f-7c14-4f99-a78c-10e75330665a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:55Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "02da5a43-7718-459c-82c2-3335c1e69ca1",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "52963",
                "uid": "9d65ed2d-f90a-469f-a330-5d56ac4f5bb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "rel-plan-admis-gvtd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "kubearchive-sink",
                "namespace": "rel-plan-admis-gvtd",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "28dbc90a-96ca-442d-8245-2fb3a596ca67"
                    }
                ],
                "resourceVersion": "53297",
                "uid": "3ead84aa-c126-4f92-9cc2-bc5c2d03041e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "kubearchive-vacuum",
                "namespace": "rel-plan-admis-gvtd",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "28dbc90a-96ca-442d-8245-2fb3a596ca67"
                    }
                ],
                "resourceVersion": "53358",
                "uid": "36597153-017b-4dee-88e8-dabc63f75f7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "rel-plan-admis-gvtd"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:deployers",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "50654",
                "uid": "b2257e15-ad67-4843-8e7b-4e9600a564df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rel-plan-admis-gvtd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-builders",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "50684",
                "uid": "5259eee1-494a-436a-9b04-515ac4fff915"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rel-plan-admis-gvtd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-pullers",
                "namespace": "rel-plan-admis-gvtd",
                "resourceVersion": "50706",
                "uid": "368b4e55-9057-464f-af54-623276394ea9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rel-plan-admis-gvtd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "release-service",
                "resourceVersion": "27263",
                "uid": "92d59b00-2947-4f87-aa21-9afb8efb5807"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "release-service",
                "resourceVersion": "27367",
                "uid": "8d0f5885-e49a-4be9-bcb4-d63a45b1f211"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admins-0",
                "namespace": "release-service",
                "resourceVersion": "27313",
                "uid": "7633d21c-fcd5-46ca-b3d1-ac614c4fadba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:23Z",
                "name": "dedicated-admins-1",
                "namespace": "release-service",
                "resourceVersion": "26449",
                "uid": "ef5a7676-67ab-4f75-988d-8a862d49d094"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:35Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "release-service",
                "resourceVersion": "27459",
                "uid": "4f7a7803-7d04-4a2f-8dda-9fe6b27a23d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:release-service/grant-argocd"
                },
                "creationTimestamp": "2026-05-10T18:39:09Z",
                "name": "grant-argocd",
                "namespace": "release-service",
                "resourceVersion": "25762",
                "uid": "0310f4ee-76e5-4f44-9f32-e9535e4d80d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:release-service/release-service-configurators"
                },
                "creationTimestamp": "2026-05-10T18:39:09Z",
                "name": "release-service-configurators",
                "namespace": "release-service",
                "resourceVersion": "25760",
                "uid": "6d048c67-70e3-4a71-b961-de7eb79d6574"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "release-service-configurator"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-release-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:release-service/release-service-leader-election-rolebinding"
                },
                "creationTimestamp": "2026-05-10T18:39:09Z",
                "name": "release-service-leader-election-rolebinding",
                "namespace": "release-service",
                "resourceVersion": "25763",
                "uid": "471b877e-6fcc-4c80-b7b9-ed61855ffff0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "release-service-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:release-service/release-service-maintainers"
                },
                "creationTimestamp": "2026-05-10T18:39:09Z",
                "name": "release-service-maintainers",
                "namespace": "release-service",
                "resourceVersion": "25761",
                "uid": "ed4cd77d-0269-4de7-b38a-dbdc1625d3f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "component-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-release-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:release-service/releaseserviceconfigs-rolebinding"
                },
                "creationTimestamp": "2026-05-10T18:39:09Z",
                "name": "releaseserviceconfigs-rolebinding",
                "namespace": "release-service",
                "resourceVersion": "25764",
                "uid": "cac1e9a8-d710-4ffb-9900-a2aa0eb1a4eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "releaseserviceconfig-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "system:deployers",
                "namespace": "release-service",
                "resourceVersion": "25355",
                "uid": "c66ac110-3e0e-4b6b-900a-75d0efe21e46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "system:image-builders",
                "namespace": "release-service",
                "resourceVersion": "25354",
                "uid": "58d3b1af-9a0d-4db6-8eb8-f0c3bc7120b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:39:06Z",
                "name": "system:image-pullers",
                "namespace": "release-service",
                "resourceVersion": "25348",
                "uid": "cd51de7c-4b69-42bf-9b1b-342348d3b18d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:28Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "repository-validator",
                "resourceVersion": "26982",
                "uid": "6601d9cb-fd26-4fd7-9145-fa2179a79fb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "repository-validator",
                "resourceVersion": "27297",
                "uid": "25139329-fde1-45c2-9d88-be6d618582a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:31Z",
                "name": "dedicated-admins-0",
                "namespace": "repository-validator",
                "resourceVersion": "27272",
                "uid": "9d3c04d3-6592-4e9c-ad09-7bda16f21d60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:24Z",
                "name": "dedicated-admins-1",
                "namespace": "repository-validator",
                "resourceVersion": "26510",
                "uid": "cc5a0c48-da41-4398-81b9-f88147e0847b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:36Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "repository-validator",
                "resourceVersion": "27473",
                "uid": "c75992d4-dae5-48a8-8528-8aa6495a8fc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "system:deployers",
                "namespace": "repository-validator",
                "resourceVersion": "23770",
                "uid": "454abd10-efc3-4446-ac7b-dfc5626266aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "repository-validator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "system:image-builders",
                "namespace": "repository-validator",
                "resourceVersion": "23769",
                "uid": "318500f8-651f-4783-8134-48212a2a861d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "repository-validator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "system:image-pullers",
                "namespace": "repository-validator",
                "resourceVersion": "23771",
                "uid": "faa51878-9d77-40d8-a121-561f4ae47886"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:repository-validator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:42Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "smee-client",
                "resourceVersion": "23167",
                "uid": "8744dd0f-f54e-4d34-b9b0-290de88a6483"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "smee-client",
                "resourceVersion": "23765",
                "uid": "2e7b892f-27a8-48b8-894d-de1cd5d63121"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:43Z",
                "name": "dedicated-admins-0",
                "namespace": "smee-client",
                "resourceVersion": "23237",
                "uid": "61a36a43-8bba-4ec4-8a13-f7429a9fb605"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:44Z",
                "name": "dedicated-admins-1",
                "namespace": "smee-client",
                "resourceVersion": "23275",
                "uid": "d8fce20b-7f98-4f7b-bad9-5a0b1321a5bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:38:49Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "smee-client",
                "resourceVersion": "23861",
                "uid": "773c7f02-07aa-4aa5-aa18-3ae712860d32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "smee-client-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:smee-client/konflux-vanguard-admins",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"smee-client-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:smee-client/konflux-vanguard-admins\"},\"name\":\"konflux-vanguard-admins\",\"namespace\":\"smee-client\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-vanguard\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "konflux-vanguard-admins",
                "namespace": "smee-client",
                "resourceVersion": "27483",
                "uid": "c1e363d8-4685-4e6b-9232-1d789fce6563"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-vanguard"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:36Z",
                "name": "system:deployers",
                "namespace": "smee-client",
                "resourceVersion": "22325",
                "uid": "3aa8293f-4859-4036-84fb-b31d7289e746"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "smee-client"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:36Z",
                "name": "system:image-builders",
                "namespace": "smee-client",
                "resourceVersion": "22326",
                "uid": "3994cea9-72ef-44da-be0f-de49d6c7906c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "smee-client"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:36Z",
                "name": "system:image-pullers",
                "namespace": "smee-client",
                "resourceVersion": "22324",
                "uid": "2eb1b8c5-9f44-481a-8ef5-0eafd0da558b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:smee-client"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:57Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "53247",
                "uid": "2d70d188-9ddf-4da9-ae31-522f23811641"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "53265",
                "uid": "2baf836b-7910-4dc5-b31c-458b83427d41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "dedicated-admins-0",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "54834",
                "uid": "49b0cf24-0760-4f12-b3cc-cfeea51c5237"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:56Z",
                "name": "dedicated-admins-1",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "53064",
                "uid": "8d7471f9-62e0-4576-8207-540f02df53a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:54Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "52922",
                "uid": "c1c7e87c-e19b-44ee-b045-69709c131c47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:53Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "a299dabe-11fc-4bfe-aa74-50074f5a0786",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "52881",
                "uid": "0bba924f-3194-490b-a674-17afaad253b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "stat-rep-aawm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:15Z",
                "name": "konflux-pipelines-runner-bindings",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "54730",
                "uid": "21047893-0adc-41dd-809c-8cdaf86349f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-pipeline-test-component-pac-dktgos",
                    "namespace": "stat-rep-aawm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "kubearchive-sink",
                "namespace": "stat-rep-aawm",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "a0ea934c-ba79-4eb2-971b-933547640005"
                    }
                ],
                "resourceVersion": "54982",
                "uid": "ddd6dfd8-fa9e-43d6-95f3-370a9d6f27b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:16Z",
                "name": "kubearchive-vacuum",
                "namespace": "stat-rep-aawm",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "a0ea934c-ba79-4eb2-971b-933547640005"
                    }
                ],
                "resourceVersion": "55006",
                "uid": "f3a55e2b-9abf-4aa0-848e-fab69ec3924c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "stat-rep-aawm"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:deployers",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "50702",
                "uid": "61814e42-a736-4ab5-a0c5-1f3cb1e0a51b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "stat-rep-aawm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-builders",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "50682",
                "uid": "4232e7d8-614c-4e3e-bd33-3befb104aebc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "stat-rep-aawm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-pullers",
                "namespace": "stat-rep-aawm",
                "resourceVersion": "50705",
                "uid": "f1d1c9f9-3355-4e60-a81f-d961cd191388"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:stat-rep-aawm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:56Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tekton-kueue",
                "resourceVersion": "30753",
                "uid": "04f2e929-d57c-4e35-ada2-2aedfe903c1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:50Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tekton-kueue",
                "resourceVersion": "30446",
                "uid": "92b37c2c-acdd-4b8b-9e2d-f1e7a8cfd302"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:50Z",
                "name": "dedicated-admins-0",
                "namespace": "tekton-kueue",
                "resourceVersion": "30455",
                "uid": "8eb47332-2df3-4a87-9913-51cdaf201480"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:54Z",
                "name": "dedicated-admins-1",
                "namespace": "tekton-kueue",
                "resourceVersion": "30652",
                "uid": "4d806cdc-faf4-4f8c-a5f3-22c8b0b026c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:54Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tekton-kueue",
                "resourceVersion": "30649",
                "uid": "50bb53bc-fe39-4c34-ac24-eea9c1bb2d07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:40:50Z",
                "name": "system:deployers",
                "namespace": "tekton-kueue",
                "resourceVersion": "30458",
                "uid": "80bc4189-7967-493e-bb95-a95ffe137a1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:40:50Z",
                "name": "system:image-builders",
                "namespace": "tekton-kueue",
                "resourceVersion": "30467",
                "uid": "05e730eb-8de1-497c-bd95-3499576c5f92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:40:50Z",
                "name": "system:image-pullers",
                "namespace": "tekton-kueue",
                "resourceVersion": "30457",
                "uid": "8e0ce47e-6363-402d-a1f8-666c8fe94cc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-kueue/tekton-kueue-leader-election-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-kueue/tekton-kueue-leader-election-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"tekton-kueue\"},\"name\":\"tekton-kueue-leader-election-rolebinding\",\"namespace\":\"tekton-kueue\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-kueue-leader-election-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-controller-manager\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:43:11Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "tekton-kueue"
                },
                "name": "tekton-kueue-leader-election-rolebinding",
                "namespace": "tekton-kueue",
                "resourceVersion": "36472",
                "uid": "c1c87f5f-36cd-49c0-974e-e99825ace0b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-kueue-leader-election-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-controller-manager",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-kueue/tekton-kueue-prometheus-k8s-read-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-kueue/tekton-kueue-prometheus-k8s-read-binding\"},\"name\":\"tekton-kueue-prometheus-k8s-read-binding\",\"namespace\":\"tekton-kueue\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-kueue-metrics-read\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-monitoring\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:52Z",
                "name": "tekton-kueue-prometheus-k8s-read-binding",
                "namespace": "tekton-kueue",
                "resourceVersion": "30573",
                "uid": "7d392977-1738-4334-a4c9-144ef8178873"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-kueue-metrics-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-kueue/tekton-kueue-webhook-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-kueue/tekton-kueue-webhook-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"tekton-kueue\"},\"name\":\"tekton-kueue-webhook-rolebinding\",\"namespace\":\"tekton-kueue\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-kueue-webhook-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-webhook\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:43:11Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "tekton-kueue"
                },
                "name": "tekton-kueue-webhook-rolebinding",
                "namespace": "tekton-kueue",
                "resourceVersion": "36471",
                "uid": "fae0cbbb-ffc3-4f38-8690-227195490895"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-kueue-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-webhook",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tekton-logging",
                "resourceVersion": "16745",
                "uid": "9b1c2ef5-4afb-4743-8c4f-8def190574f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tekton-logging",
                "resourceVersion": "16738",
                "uid": "95ec9f2b-85ef-4557-bd04-3c68686836ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admins-0",
                "namespace": "tekton-logging",
                "resourceVersion": "16734",
                "uid": "5d57824b-783a-4c8e-a1d4-ff1f50890d3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admins-1",
                "namespace": "tekton-logging",
                "resourceVersion": "16735",
                "uid": "0c2a0fbf-7be3-4442-afda-ff731c67d0a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tekton-logging",
                "resourceVersion": "16739",
                "uid": "7c226bd2-9fd8-4b02-a1df-6ff0198bc29f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-logging/pipeline-service-sre-manage-vector-pods",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-logging/pipeline-service-sre-manage-vector-pods\"},\"name\":\"pipeline-service-sre-manage-vector-pods\",\"namespace\":\"tekton-logging\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipeline-service-sre-manage-vector-pods\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-pipeline-service\"},{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-sre\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "name": "pipeline-service-sre-manage-vector-pods",
                "namespace": "tekton-logging",
                "resourceVersion": "29284",
                "uid": "614e1aa0-9cf5-4d97-b5ce-f13552e8c43b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipeline-service-sre-manage-vector-pods"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-pipeline-service"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-sre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "system:deployers",
                "namespace": "tekton-logging",
                "resourceVersion": "16731",
                "uid": "adf0e64b-1013-44e8-89fd-6c1281f725da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tekton-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "system:image-builders",
                "namespace": "tekton-logging",
                "resourceVersion": "16733",
                "uid": "d44d340b-5d28-4cf5-850a-7ce5a755ec36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tekton-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:29Z",
                "name": "system:image-pullers",
                "namespace": "tekton-logging",
                "resourceVersion": "16732",
                "uid": "d180b2c8-7eec-42f2-9b8d-2f4d878afc1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tekton-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:38Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tekton-results",
                "resourceVersion": "16797",
                "uid": "e4379620-f1a0-4348-b538-8c9749ce8f3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:38Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tekton-results",
                "resourceVersion": "16796",
                "uid": "fb22e1f0-b473-4a7a-a04c-ae91e93970cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:38Z",
                "name": "dedicated-admins-0",
                "namespace": "tekton-results",
                "resourceVersion": "16793",
                "uid": "d4013e96-6f40-467b-b4ff-9e534cfd1d4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:38Z",
                "name": "dedicated-admins-1",
                "namespace": "tekton-results",
                "resourceVersion": "16794",
                "uid": "e9d926b0-1142-466b-91bf-7805a8cd9a6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:35:38Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tekton-results",
                "resourceVersion": "16795",
                "uid": "41501a05-13bd-4b14-9c1f-0932f0d80efc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:39:37Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-application-controller",
                "namespace": "tekton-results",
                "resourceVersion": "27491",
                "uid": "cf3cbd40-7d35-403a-bc00-4c1d6b3ab540"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-10T18:39:37Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-server",
                "namespace": "tekton-results",
                "resourceVersion": "27497",
                "uid": "39a7c0a8-dc85-405c-ae0b-d2145e01f27b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-results/pipeline-service-sre-exec-pprof-data",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-results/pipeline-service-sre-exec-pprof-data\"},\"name\":\"pipeline-service-sre-exec-pprof-data\",\"namespace\":\"tekton-results\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"pipeline-service-sre-exec-pprof-data\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-pipeline-service\"},{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-sre\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "name": "pipeline-service-sre-exec-pprof-data",
                "namespace": "tekton-results",
                "resourceVersion": "29281",
                "uid": "173b7a58-168d-456f-a7eb-615e34b63f54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipeline-service-sre-exec-pprof-data"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-pipeline-service"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-sre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-results/pipeline-service-sre-ns-edit",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-results/pipeline-service-sre-ns-edit\"},\"name\":\"pipeline-service-sre-ns-edit\",\"namespace\":\"tekton-results\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"edit\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-pipeline-service\"},{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-sre\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "name": "pipeline-service-sre-ns-edit",
                "namespace": "tekton-results",
                "resourceVersion": "29285",
                "uid": "14262da7-7be1-405d-b6f5-a65b56457d36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-pipeline-service"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-sre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:40:43Z",
                "name": "storage-binding",
                "namespace": "tekton-results",
                "resourceVersion": "30115",
                "uid": "bba2a10a-3baf-430b-9310-e2c1a226b1ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "storage-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "storage-sa",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:30Z",
                "name": "system:deployers",
                "namespace": "tekton-results",
                "resourceVersion": "16769",
                "uid": "2f93b768-1de3-44aa-825d-c0410b0d8220"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:30Z",
                "name": "system:image-builders",
                "namespace": "tekton-results",
                "resourceVersion": "16770",
                "uid": "1cf10fd1-09b2-491d-832a-11736564ab71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:35:30Z",
                "name": "system:image-pullers",
                "namespace": "tekton-results",
                "resourceVersion": "16771",
                "uid": "b9e17364-e104-4503-bca5-90500e03e3de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-results/tekton-results-info",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/RoleBinding:tekton-results/tekton-results-info\"},\"labels\":{\"app.kubernetes.io/name\":\"tekton-results-info\",\"app.kubernetes.io/part-of\":\"tekton-results\",\"app.kubernetes.io/version\":\"devel\"},\"name\":\"tekton-results-info\",\"namespace\":\"tekton-results\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-results-info\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n"
                },
                "creationTimestamp": "2026-05-10T18:40:24Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "devel"
                },
                "name": "tekton-results-info",
                "namespace": "tekton-results",
                "resourceVersion": "29279",
                "uid": "caadaec3-3258-4c6e-8991-79a420a5ff1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:30Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tempo-operator",
                "resourceVersion": "27234",
                "uid": "02ad9072-ec21-4e0d-aa08-281eb8ec7f0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:33Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tempo-operator",
                "resourceVersion": "27369",
                "uid": "008bf898-5c90-486a-ae52-5cc615f069ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:29Z",
                "name": "dedicated-admins-0",
                "namespace": "tempo-operator",
                "resourceVersion": "27164",
                "uid": "fdb6097d-9b73-41a5-81fa-28be61bc8983"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:23Z",
                "name": "dedicated-admins-1",
                "namespace": "tempo-operator",
                "resourceVersion": "26461",
                "uid": "b66bc6e0-841b-4f6f-bc6c-8314dc2ccf43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:32Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tempo-operator",
                "resourceVersion": "27337",
                "uid": "fd151f00-0ccd-46aa-9c4b-b7c09e182911"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "system:deployers",
                "namespace": "tempo-operator",
                "resourceVersion": "23737",
                "uid": "27304119-04d3-4634-9781-abcf30056e33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "system:image-builders",
                "namespace": "tempo-operator",
                "resourceVersion": "23710",
                "uid": "1adefd29-771b-4e7f-945c-756f45be471a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:38:48Z",
                "name": "system:image-pullers",
                "namespace": "tempo-operator",
                "resourceVersion": "23761",
                "uid": "2a1ed39d-487f-4dc4-ae9d-992132e7564e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:55Z",
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator-controller-service-cert",
                "namespace": "tempo-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "tempo-operator.v0.20.0-3",
                        "uid": "1a4515f9-2345-425f-8cd4-b85b5ecb3bf9"
                    }
                ],
                "resourceVersion": "180521",
                "uid": "419307c2-2f8a-41ec-ad94-47d0530aafac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tempo-operator-controller-service-cert"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-10T18:39:53Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "operator-lifecycle-manager",
                    "app.kubernetes.io/name": "tempo-operator",
                    "app.kubernetes.io/part-of": "tempo-operator",
                    "olm.managed": "true"
                },
                "name": "tempo-operator-prometheus",
                "namespace": "tempo-operator",
                "resourceVersion": "27868",
                "uid": "47e2b405-8c9d-4605-abb4-b60f79085428"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tempo-operator-prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:53Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "tempo-operator.v0.20.0-3",
                "namespace": "tempo-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "tempo-operator.v0.20.0-3",
                        "uid": "9b1a0a5a-8e72-4882-9ef4-2b914b8abc48"
                    }
                ],
                "resourceVersion": "27885",
                "uid": "5f6744f1-5780-497e-ae05-f8381f85e2b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tempo-operator.v0.20.0-3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:39:55Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "olm.permissions.hash": "aRJgoPee7Jp0Wrp5NO0SdVNCmNfPOInjqtOg79",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator.v0.20.0-3-90meOMbVKfW64WsEv1Vf3b5w7LY2M7UmCnq9HZ",
                "namespace": "tempo-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "tempo-operator.v0.20.0-3",
                        "uid": "1a4515f9-2345-425f-8cd4-b85b5ecb3bf9"
                    }
                ],
                "resourceVersion": "28322",
                "uid": "02ab0747-235e-4753-b01e-4599b9c13660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tempo-operator.v0.20.0-3-90meOMbVKfW64WsEv1Vf3b5w7LY2M7UmCnq9HZ"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:58Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "upgrade-namespace",
                "resourceVersion": "53359",
                "uid": "42761818-7973-418f-a275-549164da2171"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "upgrade-namespace",
                "resourceVersion": "54336",
                "uid": "0b48e20e-e232-4ea7-8602-125e4545a15b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "name": "dedicated-admins-0",
                "namespace": "upgrade-namespace",
                "resourceVersion": "54644",
                "uid": "6d26dcfa-490f-4485-9f92-00a2c49c81f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:14Z",
                "name": "dedicated-admins-1",
                "namespace": "upgrade-namespace",
                "resourceVersion": "51135",
                "uid": "67bb96ff-f913-4b30-b61e-475c706062cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:58:50Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "upgrade-namespace",
                "resourceVersion": "52529",
                "uid": "f1cc1c40-ac6b-4013-87f8-257879798173"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kyverno",
                    "generate.kyverno.io/policy-name": "integration-init-ns-integration",
                    "generate.kyverno.io/policy-namespace": "",
                    "generate.kyverno.io/rule-name": "create-konflux-integration-runner-rolebinding",
                    "generate.kyverno.io/trigger-group": "",
                    "generate.kyverno.io/trigger-kind": "Namespace",
                    "generate.kyverno.io/trigger-namespace": "",
                    "generate.kyverno.io/trigger-uid": "cd1fde9b-876c-4037-bbde-a7ff70682b35",
                    "generate.kyverno.io/trigger-version": "v1"
                },
                "name": "konflux-integration-runner-rolebinding",
                "namespace": "upgrade-namespace",
                "resourceVersion": "53732",
                "uid": "f48776c7-1326-4ad5-aa85-e49d9ba9f0f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-integration-runner",
                    "namespace": "upgrade-namespace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:14Z",
                "name": "kubearchive-sink",
                "namespace": "upgrade-namespace",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "effa6ee1-978f-4318-be2d-c82c0cf9500e"
                    }
                ],
                "resourceVersion": "54696",
                "uid": "4cd07353-d94f-43c9-8766-d61526459a35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-sink",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-10T18:59:15Z",
                "name": "kubearchive-vacuum",
                "namespace": "upgrade-namespace",
                "ownerReferences": [
                    {
                        "apiVersion": "kubearchive.org/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "KubeArchiveConfig",
                        "name": "kubearchive",
                        "uid": "effa6ee1-978f-4318-be2d-c82c0cf9500e"
                    }
                ],
                "resourceVersion": "54755",
                "uid": "95c71652-828c-422c-9e7a-8147db27fffc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "kubearchive-vacuum"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-vacuum",
                    "namespace": "upgrade-namespace"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-cluster-vacuum",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:deployers",
                "namespace": "upgrade-namespace",
                "resourceVersion": "50713",
                "uid": "25509f5b-927a-44f1-9374-5e0981d9766c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "upgrade-namespace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-builders",
                "namespace": "upgrade-namespace",
                "resourceVersion": "50715",
                "uid": "58277b1c-1b1c-47f0-a256-0e6ecb1373aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "upgrade-namespace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-10T18:58:12Z",
                "name": "system:image-pullers",
                "namespace": "upgrade-namespace",
                "resourceVersion": "50714",
                "uid": "7fc0971e-1f9b-4d81-adae-bca49a39e073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:upgrade-namespace"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
