--- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: creationTimestamp: "2026-04-20T14:59:22Z" managedFields: - apiVersion: rbac.authorization.k8s.io/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:ownerReferences: k:{"uid":"c9aa912e-839b-403f-9298-727f1a54d417"}: {} f:roleRef: {} f:subjects: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-20T14:59:22Z" name: network-diagnostics namespace: kube-system ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: c9aa912e-839b-403f-9298-727f1a54d417 resourceVersion: "2668" uid: 35f6af03-76e5-4e9d-aa99-5b86cd48664c roleRef: apiGroup: rbac.authorization.k8s.io kind: Role name: extension-apiserver-authentication-reader subjects: - kind: ServiceAccount name: network-diagnostics namespace: openshift-network-diagnostics