{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6268",
                "uid": "d2cafe16-9d4b-4451-8bb9-c21e0a7f4767"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6277",
                "uid": "fc36c114-3997-4011-adb3-7d8ca9224fd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admins-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6281",
                "uid": "c3296d2d-186a-464a-b212-995219e42854"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6284",
                "uid": "e2f60458-60a7-4df3-9b3a-b9be8255bd6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "5875",
                "uid": "aaecf9da-9eaa-4e64-9c24-450863443c76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "system:deployers",
                "namespace": "dedicated-admin",
                "resourceVersion": "4952",
                "uid": "7008041c-2672-45f7-a608-58ef99f5d86b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "system:image-builders",
                "namespace": "dedicated-admin",
                "resourceVersion": "4954",
                "uid": "25ffbb80-5557-48ca-b481-6ac9b440ba27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "system:image-pullers",
                "namespace": "dedicated-admin",
                "resourceVersion": "4953",
                "uid": "351cb385-db93-4cd0-a045-d9ac6a51effb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "default",
                "resourceVersion": "5057",
                "uid": "0f43ef9c-e3fa-466f-b211-edda50196883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "default",
                "resourceVersion": "5158",
                "uid": "d8b817d3-1a47-4bde-b043-f5419c081c1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "default",
                "resourceVersion": "6067",
                "uid": "0d45d906-1efe-4cf5-bc62-a14b513b1ca2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "default",
                "resourceVersion": "5552",
                "uid": "a41cb388-a8be-4ab2-9340-6da81e8ba1e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "default",
                "resourceVersion": "5518",
                "uid": "e42a6873-d566-47ef-9fc2-9f4304e8a951"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "default",
                "resourceVersion": "5489",
                "uid": "7fcf76e0-07f4-4951-9dbd-19648dd1c23e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-mobb-0",
                "namespace": "default",
                "resourceVersion": "6068",
                "uid": "5d89c62d-2010-4254-9395-926ab658fb59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "default",
                "resourceVersion": "6506",
                "uid": "8b59793d-f1d2-444f-abf8-ce941d9a0ff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "default",
                "resourceVersion": "6393",
                "uid": "415e7579-43a2-4003-bdc0-2e291f4cc584"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "default",
                "resourceVersion": "5181",
                "uid": "40ff4cc2-c58f-4d85-8068-8bea786fe35b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "default",
                "resourceVersion": "5351",
                "uid": "21cc1784-8900-4382-a884-b8fa6b33c306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-tam-0",
                "namespace": "default",
                "resourceVersion": "5778",
                "uid": "414c9f10-8704-4bed-8888-07fc64f80ad0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22728",
                "uid": "17c51697-a7c4-47e7-8821-f7cfd28d293b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22725",
                "uid": "b655ce69-4f77-44d8-badf-f254c2ccad1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:47Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "default",
                "resourceVersion": "12521",
                "uid": "6866b4fb-5bb3-46db-becd-dee49447c925"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "default",
                "resourceVersion": "2021",
                "uid": "02cd0648-e7bb-40f7-9705-3233997d8275"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "default",
                "resourceVersion": "2014",
                "uid": "a2419d9a-f713-4844-801d-617cd2de420b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "default",
                "resourceVersion": "2011",
                "uid": "ef95446c-a532-4b33-90b0-e2d516663434"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "4886",
                "uid": "76f465f9-514f-442f-bb1d-b02b7de5db51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-cse-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5235",
                "uid": "4948fd77-c209-4d18-a599-33f33ac04425"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6037",
                "uid": "ba4a5d4a-a03d-43b2-a65d-5c5ac828a818"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5741",
                "uid": "033923d1-41e9-4d36-9e64-a3cb15fc6ea4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5496",
                "uid": "f3892437-0ef3-4682-aec5-33eb72c3b556"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5455",
                "uid": "377b3f50-2ff4-4fbe-ac59-a60c8c160911"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6021",
                "uid": "31647268-04b8-48b3-bd39-2091371a813d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6404",
                "uid": "9ef2cfdb-f8ee-4231-ab45-c6a717a2ebe6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "6442",
                "uid": "7a82a664-ca74-46f7-ac27-15a928017866"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5185",
                "uid": "bcfe5bf4-28ec-4f56-8f16-d30a0612902a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5409",
                "uid": "937e7069-ee29-40a5-b632-ac93ebe33423"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5796",
                "uid": "46a5299f-7782-450d-8127-3da87b5f5235"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "kube-node-lease",
                "resourceVersion": "2071",
                "uid": "c98836c3-6476-4ba0-bef6-4d64afb753ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "kube-node-lease",
                "resourceVersion": "2019",
                "uid": "129cf3ad-46d0-4099-8c51-849bd05963e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "kube-node-lease",
                "resourceVersion": "1960",
                "uid": "7d7ef8da-807a-4716-af4c-8cd6328d504f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "kube-public",
                "resourceVersion": "5022",
                "uid": "d30cfdff-8ff9-493c-a60c-b99637056c02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "kube-public",
                "resourceVersion": "5189",
                "uid": "51a7b91c-deac-4421-858b-a3a993f4585e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "kube-public",
                "resourceVersion": "6069",
                "uid": "728488a6-2704-40bd-9c62-a37109dddf08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-public",
                "resourceVersion": "5554",
                "uid": "c841c569-9e71-4883-a236-b88f4a3220f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-public",
                "resourceVersion": "5472",
                "uid": "8e13b619-1b09-4639-ad89-1ac6bb2e1637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-public",
                "resourceVersion": "5456",
                "uid": "f4fc1d50-7e29-42ca-b72a-4a9fd06f55f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-public",
                "resourceVersion": "6151",
                "uid": "83243a67-2262-416b-a8e2-f15ed37b43da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-0",
                "namespace": "kube-public",
                "resourceVersion": "6447",
                "uid": "2a7cb496-8e05-4384-97b2-ad7a5ca9aed7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "kube-public",
                "resourceVersion": "6435",
                "uid": "e02c527f-78b4-4e04-878d-3d29e1c239aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-public",
                "resourceVersion": "5219",
                "uid": "7129aa2d-cda4-4231-833c-53753bba02a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-public",
                "resourceVersion": "5389",
                "uid": "a09590bb-5b77-41c1-b747-14477b936ece"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "kube-public",
                "resourceVersion": "5817",
                "uid": "1b594df4-f12d-4db2-acb9-1db2a066827a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "268",
                "uid": "ff47c334-9f8c-41e8-bce5-aabe26039227"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "kube-public",
                "resourceVersion": "2072",
                "uid": "3f260e08-4c7e-4689-a523-70cde6ee04a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "kube-public",
                "resourceVersion": "2017",
                "uid": "e3d8920a-d9ec-4c64-82d1-7dab844ee190"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "kube-public",
                "resourceVersion": "2012",
                "uid": "fcd9a41f-3fda-4d78-aacd-63ed941fe524"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:00Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "authentication-reader-for-authenticated-users",
                "namespace": "kube-system",
                "resourceVersion": "1670",
                "uid": "474d60ea-599e-4a22-b298-5d79bcbd46e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "kube-system",
                "resourceVersion": "5066",
                "uid": "3a535fc6-d201-4d48-acaf-c5716dc4d0bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-cse-0",
                "namespace": "kube-system",
                "resourceVersion": "5224",
                "uid": "4e3d88b8-cdf1-43c8-864c-a0c7c0bba316"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-csm-0",
                "namespace": "kube-system",
                "resourceVersion": "5978",
                "uid": "f06ae6a0-eabb-4012-a608-5bffd2ce97e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-system",
                "resourceVersion": "5582",
                "uid": "5909b99d-85a4-4b0d-8c0d-be526ad0c278"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-system",
                "resourceVersion": "5376",
                "uid": "dfeaa645-067b-455b-b702-2bd1752baabc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-system",
                "resourceVersion": "5509",
                "uid": "524a63e8-027f-4359-96dd-28014a70e1a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-system",
                "resourceVersion": "6181",
                "uid": "951f559b-1c2d-4b6f-9438-7cd6bcbdf295"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "kube-system",
                "resourceVersion": "6407",
                "uid": "e513ec28-a54e-4422-a2a4-8aef14fd17f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "kube-system",
                "resourceVersion": "6494",
                "uid": "1b2d5362-f3c6-47cb-bacd-bf14031ef1bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-system",
                "resourceVersion": "5225",
                "uid": "b0f31552-8393-467a-bd60-dfc089df8fe7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-system",
                "resourceVersion": "5369",
                "uid": "8404140a-db1c-4fa9-8dd8-cbc1c7de0e46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "kube-system",
                "resourceVersion": "5988",
                "uid": "cc3c2567-8966-4880-a152-af93e80b79ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3796",
                "uid": "bc62282c-114b-4fe5-9bce-e57b3edf2689"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-operator",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3792",
                "uid": "e64a200e-e9d0-4c3a-9b94-dcdce47b8f82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:48Z",
                "name": "csi-snapshot-controller-operator-authentication-reader",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1105",
                "uid": "270e1b59-31ca-45de-87fd-758f04f732d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "labels": {
                    "app": "ecr-credential-refresh"
                },
                "name": "ecr-credential-refresh",
                "namespace": "kube-system",
                "resourceVersion": "5321",
                "uid": "b024dc4a-3818-4f2c-83f0-5c1e25b96f0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ecr-credential-refresh"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ecr-credential-refresh",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:40Z",
                "name": "insights-operator-auth",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "862",
                "uid": "83a6b766-8279-4ac3-8700-8cd014eebb99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:45Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server-auth-reader",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "12328",
                "uid": "803d1ce9-54e0-46f6-a05f-ad8f6a576713"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:32Z",
                "name": "network-diagnostics",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "4001",
                "uid": "e185bcfd-db11-4341-a8d1-09341e9b36af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:45Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator-controller-manager-service-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "17124",
                "uid": "4c745fb5-adf6-466f-94d4-fa33ffad7de7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:47Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "kube-system",
                "resourceVersion": "12527",
                "uid": "4d7735da-3317-4098-8725-07b0b771a560"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "262",
                "uid": "07f26398-612b-493b-9870-acfe2ea74100"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "263",
                "uid": "63a3f779-81c5-4cf8-9fd6-fb690ccb0b52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "264",
                "uid": "9684c05c-69b8-4f1b-9fc1-8ff20bdd18ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "265",
                "uid": "2a9c6120-5e6d-4b85-9d66-3a8e33fbcfb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "266",
                "uid": "ddc061f0-9b54-4134-bcdb-d74ecf15f52a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:43:47Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "267",
                "uid": "ca30f5d2-4ca3-4a20-ab83-8d6b22f4d5df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "kube-system",
                "resourceVersion": "2073",
                "uid": "3016d19e-6055-4635-841e-14d6d4ad1abb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "kube-system",
                "resourceVersion": "2016",
                "uid": "eec207bc-1ad0-4387-996f-303f63924097"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "kube-system",
                "resourceVersion": "2013",
                "uid": "34758ec0-37ce-41ae-b547-62129d5759ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:00Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:leader-election-lock-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "1672",
                "uid": "3daf7307-d3c4-4826-ac27-9aeb0f3102f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:leader-election-lock-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "null",
                "resourceVersion": "15393",
                "uid": "d6d3037d-6b4f-4d63-a7cd-746c9606770e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "null",
                "resourceVersion": "15343",
                "uid": "af67c27c-9c95-4e58-8dab-6c9760f0d710"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "null",
                "resourceVersion": "15435",
                "uid": "000f7b2d-23de-4bb4-acb4-192d1fba57f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admins-1",
                "namespace": "null",
                "resourceVersion": "15344",
                "uid": "0a15bd13-5b6d-45f7-b8d8-bc84c82aa878"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "null",
                "resourceVersion": "15428",
                "uid": "25e955ab-c806-4b1e-b565-f3dcdf602070"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "openshift-pipelines-edit",
                "namespace": "null",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22736",
                "uid": "e5ba1975-1f31-4409-a377-5614bde3317f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "null",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22733",
                "uid": "b052bcb1-0e65-4fc8-89b1-d8aa05d9ad03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "system:deployers",
                "namespace": "null",
                "resourceVersion": "15197",
                "uid": "6ba32a5a-6a38-476d-a9da-8db2d3fffe15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "system:image-builders",
                "namespace": "null",
                "resourceVersion": "15196",
                "uid": "82c4cf61-3cae-4ac4-87ae-25c5341f6595"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "system:image-pullers",
                "namespace": "null",
                "resourceVersion": "15195",
                "uid": "21d18d8a-2938-4345-a8d6-50458b88f01c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "6270",
                "uid": "285a7643-441e-478f-b45b-7e01f1451766"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "6280",
                "uid": "563d7d95-cd4f-4acf-875c-da54cc2a4086"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "6283",
                "uid": "8cd6867c-6f5a-4aef-816a-0b45b12357bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "6287",
                "uid": "8f31b3c4-0e10-4302-b69a-30c6653eb3d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "5878",
                "uid": "efcb0a8c-c348-4e06-a0ff-f97e5dbd7e4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "openshift-pipelines-edit",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22744",
                "uid": "afc72b16-037d-456d-9e33-21d363e956bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22741",
                "uid": "be2a552c-b37a-4244-a1b1-0d1b1f148771"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:28Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "3912",
                "uid": "433be8c1-3447-4949-804d-b9a3169ac711"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:28Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "3911",
                "uid": "3c0df485-293d-47f8-af03-5f9eb87fd9f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:28Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3",
                "resourceVersion": "3910",
                "uid": "af3d396d-c66d-468e-97b6-594532577837"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-2pqgaduas5pjdasrfpriurebbeph5ou3"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6273",
                "uid": "5e4f8cd3-e776-4cf4-a442-0e2b736df997"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6282",
                "uid": "028e22de-3841-4210-9477-4968b1702a91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6285",
                "uid": "212c31fc-79ca-4fcd-9fb2-80be6ce5ed41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "6289",
                "uid": "c656003b-3d5c-4b33-b821-454fe9e3e8db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5873",
                "uid": "9d869854-56ce-431c-b9cb-53465dcb1f29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:28Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3913",
                "uid": "8ba739ff-a164-4ef1-8096-d85012459774"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:28Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3901",
                "uid": "13c15c18-17fa-4d2d-a159-571888692f6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:28Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3900",
                "uid": "d65c4cbb-fb38-4a92-bf04-283c872a56fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "4993",
                "uid": "e0e2a0a6-4750-4ecc-abf0-4c4a76156ada"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5048",
                "uid": "b448d5be-43ba-4fa9-8ace-abdaaf747ce2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6095",
                "uid": "f597d42c-69d2-4148-800f-7b24d7c4d567"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5685",
                "uid": "9c665683-dd65-4ee6-9ad4-347c835cb3d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5378",
                "uid": "51b7cbb0-06af-4c4e-a965-3172c8e09ba4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5523",
                "uid": "388d9d49-9fb9-4cb0-8dc5-1554777c4c1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6115",
                "uid": "59632785-a739-4018-a217-5ca5bde28ddc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6421",
                "uid": "b4238db3-a6e3-4695-96df-3f6b183af676"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6489",
                "uid": "c800846f-f323-4d96-b607-9ffdbef0dcfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5251",
                "uid": "61316a87-3036-427c-9355-a0764ea4b3a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5341",
                "uid": "a33f80c1-f342-401c-b501-5e14ed91dca7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5779",
                "uid": "3f04ba45-2488-4e89-9d44-e24be6a2a103"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:39Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "823",
                "uid": "589957a2-ebbd-4984-a376-7525de1752d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "2237",
                "uid": "458bab48-3df1-4654-a5a6-c81e103f925f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "2247",
                "uid": "af9a63f2-d201-4bd0-b5d5-7af47c235d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "2249",
                "uid": "6329ca51-4b69-473a-a22b-a2a0aa94cc03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5038",
                "uid": "bcfcc7f4-76f0-4271-bfd8-bf1fc2d8b88f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5077",
                "uid": "627353b2-2567-4924-8d83-2dffaa19ce6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6004",
                "uid": "7f9341c4-279b-440a-a089-633b522b984e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5668",
                "uid": "6d2f425a-f4c2-404f-8663-cb552a0e4643"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5478",
                "uid": "7aaa6e55-7af4-4cd5-bd31-81393ebd0b64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5529",
                "uid": "5e54ebb2-a732-4538-9020-924f6a8d6c8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6047",
                "uid": "857232f2-4f78-4210-b4c4-af2cfba06a58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6475",
                "uid": "b5fad42a-7d9b-429f-b60a-2356e3a8a75d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6501",
                "uid": "0b51de52-306f-44f1-9a47-70d05a975dd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5210",
                "uid": "6521ba1c-7757-4a91-82b6-da1563feebc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5310",
                "uid": "89a6cc9a-5fb7-49ed-b915-d4cc891b6bec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5849",
                "uid": "70c59b03-d1f9-4e68-a5a9-da3cf788612b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:16Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3379",
                "uid": "83f5304d-18bd-46cc-a2c1-71890afba4cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "2248",
                "uid": "03b7fded-09f3-4940-97db-8b2b81edc840"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver",
                "resourceVersion": "2236",
                "uid": "ac87009a-fa86-478e-b63e-82996d317fe7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "2240",
                "uid": "634f719b-05b4-4785-a89c-a18f42242b79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "4918",
                "uid": "a2a48644-e4fd-488a-ae32-01700525d6eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5206",
                "uid": "4b160b00-382d-4679-bdd9-06c9d9eb9bf0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6120",
                "uid": "4cc3a30d-6d76-41ea-b644-d3e6081de015"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5757",
                "uid": "f5dfa9a5-7256-473c-9b05-47167ee790ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5380",
                "uid": "77dd57b8-2a62-465e-9592-f131b24dc3e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5535",
                "uid": "22ceb51a-8c22-4702-81b6-b2609438436d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6103",
                "uid": "60588f14-0c02-4deb-b5f4-7d0191293f75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6479",
                "uid": "8a4569b8-8096-4646-9421-9dd292a60170"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6345",
                "uid": "ee5be676-67a7-409e-9f3a-2ce9fa0e0519"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5167",
                "uid": "84d2e871-15a4-4ec2-8c55-0128ec2533c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5373",
                "uid": "5b4c5921-b0f4-46d3-a000-29ffcd6006ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5825",
                "uid": "e56bd1c1-e439-450d-ae38-eed815f59d8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:15Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3321",
                "uid": "78215334-83d9-416f-b326-68b3ca9621ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "2243",
                "uid": "784e696b-ab72-4ca1-a7ba-8607dea464f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "2244",
                "uid": "895da61e-6429-4de9-af05-2bec5c0ef87b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "2242",
                "uid": "e05e0154-2e94-48dc-b72c-3143e03f4ea0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "4946",
                "uid": "ed8278dc-ceea-4cbe-b7f6-573a6396f394"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5069",
                "uid": "f2a7ccdd-b7d1-4edc-ac17-a1b1020bc0fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6056",
                "uid": "dcfd8eaf-29bd-46c6-8d8b-aa5231e404b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5570",
                "uid": "a3177c35-bf50-41b2-abfe-de489b0337c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5419",
                "uid": "76673859-302b-4987-9a87-6603245fd8f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5429",
                "uid": "1817865c-812d-4c2d-92b4-d30e02eda225"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6100",
                "uid": "b7bd74f7-af45-4d0f-b315-4e5a45cd67da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6346",
                "uid": "fdd10956-255e-4e3c-85e5-486ed906e45d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "6384",
                "uid": "81f4a533-4b51-47f6-9b63-69df9c5251fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5165",
                "uid": "17834c51-72c7-40fd-b97d-6bcae31a1f4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5282",
                "uid": "77cf80ea-8168-4d37-9936-88d7f0ac07d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5913",
                "uid": "37b38b55-ee42-460e-83cf-02c1dd76ff55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:16Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3400",
                "uid": "ec418f95-2c46-40b7-9e53-79d248d0c678"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication",
                "resourceVersion": "2241",
                "uid": "ef4bf098-805a-4c05-8e69-b42330404bdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication",
                "resourceVersion": "2246",
                "uid": "d5612e40-13fe-4ad9-8bbc-45deedbf770f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication",
                "resourceVersion": "2239",
                "uid": "f3e3a49d-719f-401e-a392-b5262adc94b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6571",
                "uid": "d49e9031-17af-44bd-99d9-5cc05492e099"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6567",
                "uid": "25ea992d-cf9a-47e2-be86-84c280e5ca75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6749",
                "uid": "1a00ef5e-72fb-44c4-af3c-9f7553904e0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6732",
                "uid": "dd4f6750-7e7f-440a-b0e7-6850cf6a9070"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6643",
                "uid": "a416f10f-1510-4732-9371-d68f7eda9665"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6636",
                "uid": "034f4cc6-ab45-41c5-9398-35b035e2cdd6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:34Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6800",
                "uid": "6d779eaf-0a1b-411c-b75a-84fe2eb706e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6390",
                "uid": "788a51cb-a5d2-4a7d-923c-da7217eb8230"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6412",
                "uid": "a33da801-0275-4394-b526-77870db49bc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6594",
                "uid": "554560a7-6585-4ac1-81f0-f6f5b8986e4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6589",
                "uid": "16890073-7ef5-4424-84f1-5c33b4049ad6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6728",
                "uid": "18df7448-1ec4-4268-ae45-d054a6868e01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6674",
                "uid": "6104236b-c0ff-4230-8349-fd54aecf65d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6213",
                "uid": "0eb5dcc3-bf8a-4752-8631-30ee341d92ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6217",
                "uid": "e2462921-3547-4165-8be5-aaec961f0dde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6212",
                "uid": "68263b89-34a5-4fba-a83f-ba3fbaccc626"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5068",
                "uid": "e07643e0-c54f-4034-a634-aedcc9e027b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5080",
                "uid": "f7f0f5ab-2e5a-4ae8-a899-07b4c6d7249f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5980",
                "uid": "f21cb13f-736e-45a5-a874-0ba4d36e3462"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5583",
                "uid": "b8dcee66-e992-4573-b913-4f20052ee021"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5479",
                "uid": "2e5bc8f2-73af-4b35-9ccb-d1483f5f58f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5475",
                "uid": "ca28ae95-2b42-475c-8a50-e32ac8376ade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6223",
                "uid": "a1796290-8550-4304-bde5-b8471eb7386c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6427",
                "uid": "7fb96ddc-561c-4d00-84d6-71671ede2717"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6398",
                "uid": "b273b7b0-6fe2-4a4c-aa44-126c07183688"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5226",
                "uid": "4da82da3-165e-47ad-89f1-9eb619025a82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5262",
                "uid": "d67eeb15-ecff-44a3-b2a8-558868244f82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5870",
                "uid": "0d217537-e90b-466a-a5c4-2988ad23388b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5751",
                "uid": "5731a55b-9d5c-453e-b0a1-55dba63583c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:58Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "4843",
                "uid": "b1c2feb7-a4d6-4215-8c57-e0811886dda5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:58Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "4842",
                "uid": "0e87ec6a-462a-4410-8928-8fc4c53e478c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:58Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "4841",
                "uid": "96b443e1-3d24-4f5f-9574-3a945a928e66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6563",
                "uid": "bb48f592-4c63-4bf5-8fe8-f94cc47c9f7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6573",
                "uid": "ab84d8df-637f-4018-a505-ad80feccc932"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6105",
                "uid": "31a36a5d-6ced-4b78-b476-695b23043b66"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5557",
                "uid": "061faab8-06f0-4803-a204-46ca00f3d97d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5467",
                "uid": "0bb7b6bd-17c0-4477-90a3-5390ca86942b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5511",
                "uid": "3f42e893-21b9-442a-8ff7-53b0728f4573"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6265",
                "uid": "6de3ed77-8513-475f-b8f9-8ec943fe66fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6392",
                "uid": "42a9df77-4127-4dae-b26a-55f315d951ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6422",
                "uid": "b8f749e9-557c-441a-bc00-6138e7509751"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5187",
                "uid": "fbc01a1c-49c8-4392-b869-d3ab01ccb4a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5353",
                "uid": "c6fbcbec-4c85-4699-a6c5-b82667a71afb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5827",
                "uid": "6c9b1b7a-c1d5-4c2b-be72-4131d0ca772b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5753",
                "uid": "46fa9fd6-b3b8-43a6-98c4-275f75e7b9ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5126",
                "uid": "39c3ae87-2651-474e-be15-66f476c77d49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5121",
                "uid": "192a0a96-b578-464b-9998-98fa1bcf8788"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5125",
                "uid": "213e9436-7d61-4361-ae2d-b0735c65d53a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6525",
                "uid": "664675a0-d6d9-4401-a45e-fb30dc43b515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5161",
                "uid": "f8350fa7-471f-4b20-90ad-371f909abc30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5983",
                "uid": "9bfd20a9-99ae-4797-856d-e9f9786ccdd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5718",
                "uid": "b7591388-620d-4d6a-bc79-7d0411218e3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5431",
                "uid": "c99d1cf2-a000-4349-8b17-b42e36995fbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5461",
                "uid": "abd042d3-25f7-49ea-9c27-8314457dc5db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6128",
                "uid": "7b4a3df8-9ab0-47d6-af6a-9a0ef3e49e9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6429",
                "uid": "c0ba3c3a-0ce1-4ad7-9aa2-5e27dfc55dd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6476",
                "uid": "76899cc3-5c37-41e2-8d55-f9e690743c7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5253",
                "uid": "a614e32a-15ad-419a-ab5f-875ee75ef680"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5287",
                "uid": "be0f227c-6629-4742-b507-64518c30b2ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5990",
                "uid": "e6c02dca-0094-473d-9dbf-b6755a724964"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5755",
                "uid": "9158a931-ca91-42b1-9e39-788f54c7405b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5019",
                "uid": "7228a231-8c73-48f4-83d7-2fc6ba0bd932"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5020",
                "uid": "56c26b0c-befb-4f62-b7b0-a5c50eb53631"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5016",
                "uid": "569e4da8-4a04-47b7-9359-9d80390e9e7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6575",
                "uid": "8301e0dd-6644-4f16-9205-aabda541e4f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-cee-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6234",
                "uid": "2bbf6648-6cb3-4722-8573-beb76dd17ab5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5220",
                "uid": "cd45e0f2-a4bd-4cc2-b568-191f67c35f36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6085",
                "uid": "ccbf0cd3-2600-4df5-ad70-4a238daa1656"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-csm-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5136",
                "uid": "8fa28b3f-86cc-4da0-a616-467e42f9f655"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5645",
                "uid": "1f997d02-18e9-4484-991a-ed7aa2c9afb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5382",
                "uid": "16ffb11e-d76b-43c2-a76e-6d22ccdf8d83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5525",
                "uid": "9bde340b-5e65-400a-b08b-cd371bfa9b42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-mcs-tier-two-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6332",
                "uid": "b9d8aa6b-5ba4-4de8-b6de-28b3a3fdbbab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6027",
                "uid": "d9587abe-c8fa-46a5-bf1d-ca7ae4b96ea1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-mobb-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5953",
                "uid": "1ea83426-fe74-4896-b159-0d05755771f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6396",
                "uid": "60c28bbd-f4b3-428c-b8d8-a64140bd8191"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6334",
                "uid": "cbc3c6c9-feeb-471e-976b-23684a1f0120"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:30Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6741",
                "uid": "366e8a58-2f7e-4e22-9431-094f66187d29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5260",
                "uid": "cd8b7f57-66ae-4f11-b599-47d3211fbbe1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5240",
                "uid": "e25ebee3-3276-47a9-bc63-8249c4a0c730"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5998",
                "uid": "00f07bc7-96c8-4cfb-a195-16ba793d652d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-tam-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6160",
                "uid": "4eee8dac-9b29-44fc-80f4-e214587356c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "osd-delete-backplane-script-resources",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5666",
                "uid": "aa101261-dd7f-44c1-ba43-a70141a89c0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5758",
                "uid": "d2920b5b-e260-460d-9280-bbcdb8c3a8cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "4911",
                "uid": "0c40e23d-354a-433e-9c53-a3fe90895669"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "4917",
                "uid": "6c7ef890-aa7e-429f-b949-922209f5335d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "4916",
                "uid": "1e65cf1e-7204-4c9d-894e-a45e22a64d9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6568",
                "uid": "fd6f5cc6-ec37-48f3-aa69-510833ed81e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6541",
                "uid": "fce04c00-b425-46ba-94ca-2605fd652edb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:34Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6799",
                "uid": "c26f3c5b-90c9-4ac7-9369-e0eb3d60ddf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6706",
                "uid": "e4d11f27-c03f-49bb-b9c3-38d447951629"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6647",
                "uid": "488ec31b-5a62-491d-ac34-c2319042d70d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:20Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6649",
                "uid": "f213a353-8a1d-4c23-af06-719a1448118c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6793",
                "uid": "41172879-fe1b-45a8-b3da-14f1cbb8a34b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6449",
                "uid": "86fd70e2-e5bc-4f9d-81e3-d54997783551"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6347",
                "uid": "c854c860-79a1-43dc-aa25-1cef27e567f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:16Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6613",
                "uid": "f8962d67-61c1-43cd-88e8-b06c4aa89307"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6602",
                "uid": "1cfe7c73-7830-4b51-a4c8-00a050da4d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6690",
                "uid": "8997ab9a-54fa-4041-a949-1b8e8260cace"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6677",
                "uid": "2a825c10-192e-4fd5-afe8-273f0c201c53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6317",
                "uid": "3ec0cdb0-b1b4-40a1-9457-eecb199bfaad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6320",
                "uid": "25a980ee-2f90-40c4-8c91-48d7c892848d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6319",
                "uid": "0ff4a631-66a5-41bd-9460-2e27007a864f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6547",
                "uid": "064b1e91-3cbc-43da-9822-c3e1a51df66e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6578",
                "uid": "efe88970-bb6c-402f-8c50-9d63a4d1f190"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6123",
                "uid": "96f196fb-828d-41df-b06e-bc432d1ae63b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6686",
                "uid": "b03d97dd-f707-4bc8-b6a0-86cacc87b5fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6630",
                "uid": "a8ec7962-bb87-49ed-a473-cf2aa807b3b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6657",
                "uid": "6a8d7d23-cc87-4873-8151-fbfa86046914"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6187",
                "uid": "0d2a1046-432c-4227-a941-faf4c0802d96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6355",
                "uid": "0aaa9810-e793-4b78-a9d9-14e90ab74cfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6495",
                "uid": "d1171c30-46cf-4a72-a7c6-e2f18cc1262f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6599",
                "uid": "81be5f52-6ccf-4ac8-ba4e-075ec495c9ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6597",
                "uid": "e9a4a6aa-cfa3-43b6-b5f9-0517d7f41477"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6699",
                "uid": "05b0e9f6-a2fc-4fe2-a857-893ae9b63e24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6679",
                "uid": "cb137042-f1c7-40e4-9460-71b86f1cf72e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5941",
                "uid": "b1f9be98-c707-4ae2-8019-f9ea63ae7230"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5940",
                "uid": "5c0c6949-4f10-4afe-8b5b-b2c3f0b3ae69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "5939",
                "uid": "5e9e2e40-517a-4097-b348-fa53885629cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:09Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6559",
                "uid": "2f21f0d2-a0af-481f-bde3-e5c544b31a33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6557",
                "uid": "c155957c-b956-4d5d-ac59-da6982becdee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:32Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6789",
                "uid": "747ba0e9-730a-4c5f-8f11-792d169d986a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6707",
                "uid": "0a769b07-c7e2-43d0-852b-b449b9a15ee3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6638",
                "uid": "79420d0f-d2a6-4c0c-ba6c-934fc239abcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6670",
                "uid": "26f14259-ae84-44d4-be96-983a108b2d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:33Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6797",
                "uid": "be30f186-c9a8-489c-a02b-96a7515ecc40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6461",
                "uid": "642798a9-2286-4aec-9e20-dc654ffde072"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6460",
                "uid": "10699495-2d4f-410f-afe0-50c58ee5a8e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6587",
                "uid": "7111815f-c6a0-47a0-8f6b-538f16db6798"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6608",
                "uid": "5247969e-6675-42fa-aada-55f878d38bf1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6705",
                "uid": "382273e3-f48b-45a3-af5e-2e131447c6a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6680",
                "uid": "392ed319-fada-4e0a-948b-e1cb50ce3034"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6259",
                "uid": "472a2005-e80b-4d07-82ad-d4fa6a3a7cc3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6262",
                "uid": "bdf9a221-2a96-48c8-98c5-012375f81b63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6261",
                "uid": "d5628c5b-1561-4083-b874-c6c93e04007a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6535",
                "uid": "f81df98e-2e64-48af-b5f5-63518cb9b103"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5067",
                "uid": "a1368d99-ba54-4b65-ab12-c5d0cead4abd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6113",
                "uid": "287e0cf3-7ff7-4c0b-9db1-e2abc5ba1de0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5684",
                "uid": "454234e5-54cd-4212-a458-068cb616c7f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5438",
                "uid": "0d57eb4f-e46c-4fe8-a340-5a4af662114d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5451",
                "uid": "79d93379-a28c-48ba-bf2c-f926386e343e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6051",
                "uid": "458b8c90-6234-43dc-acfb-d71dda1c47a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6366",
                "uid": "b255a7d1-6964-4e92-94b1-03f53bb2f354"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6481",
                "uid": "911b7761-69c5-469c-a484-fe4cfb716a03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5146",
                "uid": "598929f5-071a-4119-9894-b66a0434931a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5344",
                "uid": "ef5dc38d-7310-49a3-b7e6-af89ddebd7b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5906",
                "uid": "67e01c15-bda2-4680-b5b6-fe8a9d790628"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "5761",
                "uid": "660a4ca8-7101-4f32-b9a0-a900e74fc4b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4868",
                "uid": "630edbea-df52-4efe-ae86-53627a3f7464"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4869",
                "uid": "c66ed09d-2aea-43bf-9ffb-ed8d3f764de4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "4867",
                "uid": "e37a4b27-ca45-4456-8dc7-e44f839dedbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6527",
                "uid": "e5524a57-80c0-4c0c-b676-18a650e12396"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6550",
                "uid": "48a1a166-7a12-48f4-81c3-5284cdec32ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:31Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6780",
                "uid": "c279face-d1ff-49b6-b5f4-75d818ba0fed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6733",
                "uid": "1c5bd9e5-a774-4aad-9821-8b7fb272e564"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:17Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6625",
                "uid": "58cb86a7-739e-432d-a3a0-56bec8ab4d7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6627",
                "uid": "62e3464f-aea6-4225-a712-b5795bf039ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6807",
                "uid": "d9ddb148-9cce-430c-a32f-f8bcff36e55a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6512",
                "uid": "f0f5b711-35fb-4a6d-93db-58d7912bf8cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6374",
                "uid": "30dd8015-1201-43ca-8a9b-2c13b723c73e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6607",
                "uid": "7768c15e-bdd1-41b8-abcc-d01770caa596"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6593",
                "uid": "0d2efcd3-cc8b-48bf-a10f-24e99b35181b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:28Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6727",
                "uid": "65c884ee-dc42-4e33-9fa9-2020d986656f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:24Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6682",
                "uid": "5494a3d5-b362-4227-9653-c8e31ff87354"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6147",
                "uid": "58a1e196-81ee-420e-bff9-c1eeaec0076b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6148",
                "uid": "11ef252d-c36f-48f8-8a84-c0be438af24e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6146",
                "uid": "48220a90-cde4-4d72-8aef-efe78608ddce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:07Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6545",
                "uid": "393973a8-9582-4031-a549-8adc48e8b2e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6539",
                "uid": "67a6a1bc-e3f3-4f77-90f5-9f0c69337f76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6121",
                "uid": "af82958e-e56f-402b-a5c5-c006070c7cd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6703",
                "uid": "2c206847-f254-430e-9488-3d9b8fef3a8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6641",
                "uid": "66b5e244-af00-4db4-9f32-f39ad98e47de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6675",
                "uid": "61ebf3a2-dd86-4bb4-98b9-6704f7b6559e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6024",
                "uid": "903074bd-a663-4ca2-9a8b-19603cc75d75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6510",
                "uid": "4e925154-a967-404b-869a-17c36a4f6ee8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6362",
                "uid": "a061e4ed-2f1e-4312-b87b-7c1cb5b6a38f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:16Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6620",
                "uid": "4419d0c6-8918-4ab4-aac9-e7bd3b003bcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6622",
                "uid": "caada1ab-071b-4417-a7fb-6faa155d017c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6693",
                "uid": "743c8749-8bb3-429a-a440-27ecceb0f689"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5822",
                "uid": "d5775669-479f-43cb-8b81-9025b790fc86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane",
                "resourceVersion": "5823",
                "uid": "7a7af85b-dc73-4c81-a7ee-73336271a662"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane",
                "resourceVersion": "5816",
                "uid": "999b9b6e-c5ba-4e2c-9ba3-32dc73b4d871"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "4995",
                "uid": "d029d739-84da-4529-b601-2b6d04c5c5b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5062",
                "uid": "8fae3cb4-8348-48fc-b274-13d2e854a875"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6041",
                "uid": "1fe9bb33-fc63-44c3-a807-480f6f4231c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5722",
                "uid": "3d2581f0-838e-431b-84ba-b76f72681fd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5492",
                "uid": "aab83e42-d85a-4889-9e86-08298692dd2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5513",
                "uid": "897a06d5-6e45-4e37-99f4-1d4de042d899"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6072",
                "uid": "5c2f9e42-f898-4736-a159-a62c42d0a08e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6465",
                "uid": "9bf64fe4-8be8-49d5-9def-9570877a070d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6503",
                "uid": "c17cf91e-22de-492a-a044-5503456239a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5254",
                "uid": "a45cea1c-2b19-4058-930e-afd8b055e20e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5289",
                "uid": "fe7cc929-e8f2-4338-bba0-46a1a0a4c80d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5914",
                "uid": "586417d0-5d23-45b9-9590-5853dbc8b0ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "2245",
                "uid": "510d0a1a-dc84-4f04-a330-a36be9335928"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "2235",
                "uid": "b3dbdecd-3623-4ee7-886b-49d7aac52427"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "2180",
                "uid": "4677cdb2-05ab-4eaa-8752-4efbf1261513"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5026",
                "uid": "f90179be-a02b-4957-88bc-d58161508298"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5230",
                "uid": "e2131471-8c04-4314-9bd7-f56801cee81f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5995",
                "uid": "bf33bf1f-1b78-4474-b512-e560e82ccc19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5759",
                "uid": "5b7e3834-354f-444c-828d-b2d62f3c84e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5368",
                "uid": "33d45ab8-9ce1-4d51-a4f2-bfd2504d4595"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5495",
                "uid": "f09fe2d9-8e0e-4640-974e-1893978b2448"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6233",
                "uid": "98f93495-ef1e-4004-934a-bc70118cd124"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6490",
                "uid": "a1388a83-8945-4166-8117-4266869c3bed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6437",
                "uid": "57832cb6-686b-4583-9548-75c9f3d19a19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5223",
                "uid": "bbe5332a-6369-48e5-afa2-fd7f706ea877"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5263",
                "uid": "57128d2b-c077-4750-a5cd-7183e2be07a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5872",
                "uid": "0bfced02-8a91-4696-81a3-0fe8e4991c85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:46Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1042",
                "uid": "df7d5e1f-e4b8-4058-b6c9-34fda5fe0e74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:36Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "727",
                "uid": "a92f4a76-f990-455c-9944-eb08f56518d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "2403",
                "uid": "692a2eef-5715-47ad-b3c9-671684ee8eff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "2442",
                "uid": "c57bf5ef-86a4-4946-b2a4-630be7db4bc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "2355",
                "uid": "3c4fed01-3dda-4b2a-a3c6-4d717f04018e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5027",
                "uid": "1ab3f9ed-fbe3-4397-a0c6-e6c07b829456"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5135",
                "uid": "7e86eabe-6d24-447a-b159-3726b6902cfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6087",
                "uid": "c77ab4e9-9a40-43dd-b7a0-193208818262"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5550",
                "uid": "8f852ed5-3545-46c3-bce4-93b82526b218"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5481",
                "uid": "808084b9-f7ec-41fd-b143-c15747596029"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5477",
                "uid": "5204b824-0a43-49fd-87a7-c9276c1bab31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6235",
                "uid": "9f4ad513-d62e-4897-bf55-bbbde658ddc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6356",
                "uid": "b707c277-181d-4f0c-aca3-e280317931cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6439",
                "uid": "90e80f4f-c597-46c7-87a3-0671370f454c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5280",
                "uid": "b26b3eb3-b212-47e5-a048-2003b9f17bce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5330",
                "uid": "73af1e16-e46b-4bac-bd39-18f5ad70ddb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5994",
                "uid": "f5a37e2b-c9be-42b6-838c-ccacfb4ca6cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:16Z",
                "name": "cloud-network-config-controller-rb",
                "namespace": "openshift-cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3360",
                "uid": "54772ef3-4ea5-4044-a1a5-f23eea16ea91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "2438",
                "uid": "a16b7352-7550-42e4-ac8d-bb8af6ee722d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "2440",
                "uid": "77cace21-15b9-4506-b3ad-170d8bbd6fbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "2434",
                "uid": "7c653f4c-63d9-4ac8-8a2d-6f4f75bdcd38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:04Z",
                "name": "aws-ebs-csi-driver-lease-leader-election",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1897",
                "uid": "17c27d31-8e0e-4857-b138-75c04434b213"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-lease-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:44:57Z",
                "name": "aws-ebs-csi-driver-operator-rolebinding",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1506",
                "uid": "77f7419f-298f-4a51-8be7-0df00c2a2edb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "4975",
                "uid": "34621b69-8ac5-4925-ad20-b348b9980bcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5128",
                "uid": "b3221213-376d-4701-ab48-7432a5386c90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6077",
                "uid": "a1480134-e93b-43ec-9366-a4f35c1fe496"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5651",
                "uid": "2f7efd5c-65e2-440c-b303-1a62f86b0539"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5386",
                "uid": "95db2520-4a13-49f7-b599-5f661905df0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5464",
                "uid": "1d67d340-cd91-4ed6-85ba-4d12393dfe7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6029",
                "uid": "e21d6fcc-3039-420d-a7da-03accfa3a963"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6408",
                "uid": "86232467-f490-460c-a219-b67e400752f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6463",
                "uid": "fc779782-6522-4a5b-8331-0bea2802b9bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5147",
                "uid": "7b2ff90e-6b4b-441a-ac78-24e3611d25a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5355",
                "uid": "f1f0bdd0-e518-43bf-a3b2-f28422140521"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5781",
                "uid": "4a52eace-9486-49eb-a280-f59d2fed45b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2439",
                "uid": "a2eb3c0c-e985-4840-858f-f4f3872cbd36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2441",
                "uid": "9053366f-09aa-46d0-b729-1226829f4775"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2437",
                "uid": "04da7d15-62fd-44f1-b0cc-2b33c6723013"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5060",
                "uid": "35f40890-4fdf-4d77-ac42-3954c27de304"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5051",
                "uid": "bca63ce1-9417-40c9-bfe2-beffaa34eb9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6090",
                "uid": "4aa37d8b-b9da-46f2-b110-46a268fbfedf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5559",
                "uid": "0ea0ff22-d026-4029-8bfe-91f0c378e813"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5422",
                "uid": "547376ff-395a-4114-bf25-188a4adebef3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5562",
                "uid": "9f99d980-2e71-48f1-8490-04dd5967ee3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6036",
                "uid": "632ce4a1-6ccc-46e5-a499-42ee51990b45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6411",
                "uid": "ace7e1e9-7873-4c40-9f13-fe9f42744619"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6400",
                "uid": "9b04ffcb-078f-45cf-90d2-5e7adfb5987f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5264",
                "uid": "922ae173-d38a-402e-ad84-471ac91370b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5242",
                "uid": "7f4e5c68-fae1-4970-82dc-34db7b56a91f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5948",
                "uid": "903ca0bf-0c2f-4328-99b6-a3f19d180391"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:40Z",
                "name": "machine-approver",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "868",
                "uid": "8ad509cd-1284-4719-a7f9-981cbe76dc81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:39Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "821",
                "uid": "6cb87079-940a-4f37-bd48-8306f5883afb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "2433",
                "uid": "73156b2f-c728-407a-9e5e-2b1e589278a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "2432",
                "uid": "ca684e66-f10c-4b0f-8bfe-b972be08790b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "2430",
                "uid": "cf011310-6d85-440b-92b1-f69ad03f4dc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5029",
                "uid": "67e3c673-feb1-4280-88d2-1f8a4ae5d5fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5227",
                "uid": "6c801bfd-b85a-45ff-ad58-459d3afbc484"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5997",
                "uid": "03b0a6bb-1632-406e-8759-af1432d1548f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5725",
                "uid": "56187f94-5ded-42a5-9fcc-1f9fd69e26e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5468",
                "uid": "5d4bec3a-99e0-436f-a31b-694950e03e2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5441",
                "uid": "64074b34-25e9-4d24-ba8f-9b9d8a601d7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6119",
                "uid": "7b0aeff1-6152-4c96-adae-8af69526a91d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6333",
                "uid": "0a5f1579-1a7c-41fb-8ad2-a10d7da6d8ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6441",
                "uid": "6938c960-17f4-4f69-9f35-7577a140cf80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5212",
                "uid": "00379d36-240a-4868-a697-0558486a4309"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5265",
                "uid": "f693732a-aa9f-4412-81e9-7445861e74ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5996",
                "uid": "9fbf65b2-99f8-411a-b398-4a750d615f4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:44Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1002",
                "uid": "54430d75-95a6-4a7c-888a-5dfc7302b229"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "2443",
                "uid": "41d675f8-04fe-41b7-8b79-6047e0524900"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "2435",
                "uid": "464e468c-2078-43db-88ea-d9837170eb64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "2436",
                "uid": "a19a53de-e2ab-4dba-a98f-f926e2ea2e91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5084",
                "uid": "c3ee8a42-795d-4ec7-bb0e-7559df499b92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5143",
                "uid": "cf992dc9-6806-4ed6-85c3-57b832f675d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6061",
                "uid": "2c0e593e-7311-4825-8b16-370dd328790b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5780",
                "uid": "802ee441-3ff0-4dfd-a1e6-a28e9bfae2ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5501",
                "uid": "f3c1bd2c-a3fd-45ea-92aa-d78792f16720"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5457",
                "uid": "3219eb15-89bb-40f4-95a5-d7d604cec50c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6091",
                "uid": "7fd34c08-902f-41d8-9a52-d654b646d7dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6515",
                "uid": "a529bcba-44d6-423d-9130-cc12a8583880"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6423",
                "uid": "dfacfe05-4447-48e3-8b58-e28a71321e01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5149",
                "uid": "a78f0103-5acf-4bbc-8e5a-d1934990d24d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5377",
                "uid": "853088c3-fe85-4320-884f-37686903f58f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5955",
                "uid": "76bdcf2c-e545-4b9e-a1f3-07860b941051"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:55Z",
                "name": "cluster-samples-operator",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1390",
                "uid": "76adeffb-83fb-4525-9f44-10b44bdedbed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:55:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "11537",
                "uid": "2e76b130-2ae7-434e-943a-4c789b46900d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "2499",
                "uid": "eff8235e-2510-41ef-9456-483a79091462"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "2555",
                "uid": "de8a6d7a-9ec0-47fd-9ffe-cd3101e67831"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "2470",
                "uid": "fcbf16b4-7ee3-4b33-8b71-5eb3648217af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4976",
                "uid": "6730810d-4030-48e3-8c25-1c93154857f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5053",
                "uid": "23b664c3-c37b-4291-b55b-601d911e7057"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6126",
                "uid": "ae694f20-71fc-4b88-a115-943011f6a1ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5563",
                "uid": "28f563fc-dfb0-4c7a-8f5e-c13d45f4aa64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5398",
                "uid": "61a8cc75-ed14-4d57-bab0-24010cc03cfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5565",
                "uid": "f4f6a415-32de-449e-81a2-477bd34050eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6236",
                "uid": "6f63bdb8-3394-42ae-b639-fa30d944fc60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6335",
                "uid": "e87537b5-9379-4b69-aeb4-377a0f793a44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6415",
                "uid": "bba06625-236a-43fe-a26e-b6267470fcbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5228",
                "uid": "4bda147d-0c93-4364-ba14-37028a626050"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5371",
                "uid": "5b6b766f-be59-4d1e-a057-d7a8647a5a93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5783",
                "uid": "4423a92c-3a06-47e2-83e3-a26cd9050e91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:47Z",
                "name": "csi-snapshot-controller-leaderelection",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1075",
                "uid": "bef31cc7-786f-4959-8619-0fb9a44cd152"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:55Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-role",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1377",
                "uid": "6ac537c7-c602-4b62-8269-ebcadcd6ec6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:36Z",
                "name": "prometheus",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "729",
                "uid": "ca83f70a-da2f-491c-98fd-6afc50b262d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "2554",
                "uid": "8b7d2df6-1a93-419b-ac59-3f543e75c8c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "2556",
                "uid": "5b7dbd23-636e-441c-8c12-b5a51ddf3a43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "2525",
                "uid": "12cbd0c0-123b-4a8a-bd25-aae2f11e549f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4905",
                "uid": "c6b57817-df1f-46a3-85ef-14f1c0a952a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5083",
                "uid": "98e73b79-b3cb-49b8-ac25-98a542a4c9e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6098",
                "uid": "bfe25984-cacf-409f-895e-d565c0edd966"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5763",
                "uid": "e3de337c-f560-4bf0-8a10-c2510f9d5df2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5401",
                "uid": "7cce7994-8cec-4a7a-9007-3ac7669fb050"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5443",
                "uid": "0e9e2d38-dd4e-4c3f-8fb6-fc11bd9aed7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6076",
                "uid": "3cd67770-0bd2-48f8-bc5e-f4f35d9b64ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6368",
                "uid": "347a815b-77e1-4e48-9180-0448e5d05c2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6387",
                "uid": "e89ea651-1e6d-4bae-ac51-2bea2378acdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5197",
                "uid": "09ee7dce-970e-4408-89f1-6c58926b7d88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5346",
                "uid": "89ff3798-9a8e-4bc7-acfe-575092eabfbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5943",
                "uid": "853a79cc-e94d-471b-87b5-fc10d25f8fc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "exclude.release.openshift.io/internal-openshift-hosted": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"exclude.release.openshift.io/internal-openshift-hosted\":\"true\",\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant Prometheus access to monitor the cluster-version operator's metrics.\"},\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-cluster-version\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"prometheus-k8s\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-monitoring\"}]}\n",
                    "kubernetes.io/description": "Grant Prometheus access to monitor the cluster-version operator's metrics."
                },
                "creationTimestamp": "2026-04-21T10:44:29Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "508",
                "uid": "64beae6a-83a3-4012-aec4-5aa3d99eafa0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "2552",
                "uid": "03f0ba75-a779-45dc-a68a-d320e7746b96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "2551",
                "uid": "4fbdcf00-bf52-4424-a7b1-e1e356c94580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "2550",
                "uid": "1e2ed9a9-74cd-45e9-9411-37dab5f16bfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5012",
                "uid": "07de550b-be42-40ed-9260-767679d17a11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5072",
                "uid": "3bb6cf56-07ff-46b2-9aeb-ee87f5309bf4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6006",
                "uid": "d1bce88e-1b06-4c3c-832a-4c4b8b9abdeb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5794",
                "uid": "e895eabc-c048-445b-b723-889900018da6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5439",
                "uid": "6447b04e-5837-463f-b0f0-b1ed14202abe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5469",
                "uid": "d65ed50b-c057-4649-a44c-cd7fa7648ede"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6078",
                "uid": "17b73c71-aedb-4aff-9b1e-cd9d253de81f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6338",
                "uid": "0d98231d-150a-434d-a699-5d9616cb65cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6426",
                "uid": "af82e8e5-f8ef-4d72-8387-6e8c807422fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5190",
                "uid": "6c151100-1a7b-43f8-b8c0-1da21be9b3a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5381",
                "uid": "90435612-f106-45e8-887c-81d04c60d9b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5963",
                "uid": "27de1e4f-0802-4ed7-b3d2-cd1360a919a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:41Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "901",
                "uid": "e33a70ee-2a23-49ec-a4c1-9335654c330c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-configmap-reader",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3793",
                "uid": "b21f3bdf-9f6b-415c-a683-bfee87e64661"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-configmap-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3782",
                "uid": "19ffd89e-5e8b-4d72-a77a-8761fd385517"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-public",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3784",
                "uid": "a7cd5fd2-3850-4868-835e-73b205606bc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-public"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:57Z",
                "name": "insights-operator-etc-pki-entitlement",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1561",
                "uid": "05b8ca33-6569-4d4b-9a7c-78057986048f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-etc-pki-entitlement"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:43Z",
                "name": "machine-approver",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "946",
                "uid": "34d2b4c9-beca-45c4-bafe-6926dbb6d3f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Grants access from any authenticated user to the openshift-network-features ConfigMap"
                },
                "creationTimestamp": "2026-04-21T10:45:34Z",
                "name": "openshift-network-public-role-binding",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "4023",
                "uid": "72321380-67aa-4cb9-990d-04d4f784d374"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-network-public-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "2547",
                "uid": "5b22c821-eca1-4226-a689-de95b3f104ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-managed",
                "resourceVersion": "2549",
                "uid": "a669555d-774b-4e7a-8584-d567dac3d5ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "2544",
                "uid": "339fffc7-605b-4be0-8714-a636db60b751"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:00Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:oauth-servercert-trust",
                "namespace": "openshift-config-managed",
                "resourceVersion": "1781",
                "uid": "e67ddf57-a679-4d46-bc39-ce6353c1c5ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:oauth-servercert-trust"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "4920",
                "uid": "c71fc1ff-57f3-4c22-a269-340f3caf63f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5130",
                "uid": "f3c17f2b-dbc6-4ecc-b364-26f370465f0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6070",
                "uid": "83f2c2fd-b245-4eaa-98ca-97cfc9540b33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5576",
                "uid": "f4a6b59b-91ce-4cee-9623-1e3af42663e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5435",
                "uid": "406b0199-b98b-43be-a439-ff7c84344c37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5493",
                "uid": "a801ff20-9a58-4fc7-b876-742d6074c1cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6214",
                "uid": "4f0f743e-8dd7-4dad-8064-fa357613c42e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6467",
                "uid": "1828d26e-3263-4a75-9c5b-00c769f48153"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6452",
                "uid": "08ea92a6-299f-4457-adf2-a94707b4fed7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5296",
                "uid": "e7e653b2-fa4b-4839-a7bb-6d5d7c7f7ed8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5261",
                "uid": "b1af7285-1444-46fb-890b-374322735ae7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5979",
                "uid": "65870b41-96b7-4104-b31c-17da461ae172"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:57Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1527",
                "uid": "4b1c193e-98c0-4f2d-ba86-bc4318daefd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "2572",
                "uid": "be93f091-bb69-40a9-98e9-218b5ebe5b7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-operator",
                "resourceVersion": "2596",
                "uid": "4511bf16-260f-44b4-b038-71e8e9bfe888"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "2553",
                "uid": "2f88379a-8c77-4885-bea8-89e38298644d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config",
                "resourceVersion": "5052",
                "uid": "aa49c220-2bd6-4d93-953b-53b56d031a9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config",
                "resourceVersion": "5179",
                "uid": "b7f87c14-cd9e-4676-974f-e86e0a94ff7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config",
                "resourceVersion": "6032",
                "uid": "518d2a0f-263a-4c9c-bdde-cb37eed9f5a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config",
                "resourceVersion": "5574",
                "uid": "86633a4e-7672-41ed-884c-5746ad5bdc65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config",
                "resourceVersion": "5432",
                "uid": "66ab5f09-b2d8-465d-81d3-7fed84f1087b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config",
                "resourceVersion": "5538",
                "uid": "47d38337-f39c-4b07-8267-d0ae3a51a7ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config",
                "resourceVersion": "6094",
                "uid": "113d55a0-3627-402c-8c06-f159831744bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config",
                "resourceVersion": "6413",
                "uid": "26e5f142-2847-4ca5-9871-b1247634274b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config",
                "resourceVersion": "6416",
                "uid": "310b31e5-6939-4c37-a920-a1658ed558c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config",
                "resourceVersion": "5152",
                "uid": "d4b00ef4-655d-4ecf-9185-606dc211f8a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config",
                "resourceVersion": "5313",
                "uid": "dff998d7-3897-41d8-bdbc-fe8caf85a3fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config",
                "resourceVersion": "5944",
                "uid": "762aa773-1e0f-4845-9ad3-c063e57bbd5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:44Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "978",
                "uid": "109b03a2-e1ed-47e6-b6f8-03a6402ee340"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:57Z",
                "name": "cluster-samples-operator-openshift-config-secret-reader",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1539",
                "uid": "827ea731-4564-4962-b77c-9ec5d694ad35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "coreos-pull-secret-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3787",
                "uid": "46b99b0d-6ac8-450c-b0d3-4c1e965924de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "dedicated-admins-project-request",
                "namespace": "openshift-config",
                "resourceVersion": "5354",
                "uid": "f0451ea8-85a0-44b4-87d8-b0b765d13000"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-project-request"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "dedicated-admins-registry-cas-project",
                "namespace": "openshift-config",
                "resourceVersion": "4919",
                "uid": "80131f37-6ee4-41ac-a281-ece6477c6c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-registry-cas-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:52Z",
                "name": "ingress-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1300",
                "uid": "73d9a7bc-38d3-40ea-bbe0-b9d19531ac33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:56Z",
                "name": "insights-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1415",
                "uid": "0e5e0b61-1ce8-42ce-9b3b-3de25481d716"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-config",
                "resourceVersion": "2546",
                "uid": "ce0a8af1-e33f-4c05-906f-dcd258ae43aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-config",
                "resourceVersion": "2548",
                "uid": "930b5127-3dd6-43df-91b2-3e78e5212d2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config",
                "resourceVersion": "2545",
                "uid": "84462b9c-720d-4265-9046-1311177b3d2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5018",
                "uid": "d15eb150-8e3b-46f4-a7e8-68b169ab9c73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5211",
                "uid": "3d756f6b-9334-45b6-bec5-bb2a9d8a3672"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5964",
                "uid": "0fe466aa-d766-4a3c-b207-6726b059cab4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5628",
                "uid": "52ab25ff-3d50-4429-9546-320b407ad70a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5408",
                "uid": "2199bb59-ed70-4ffc-bfa0-8160d6028eee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5445",
                "uid": "5f5ee6b8-04c8-438c-b856-882201d9af09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6225",
                "uid": "06af2777-1908-46f2-91eb-41f736c0b486"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6359",
                "uid": "48a0eb7e-86db-4e22-876b-84a0ae8b95cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6448",
                "uid": "f10413a7-1a76-409c-a958-0b4bb7c5295a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5268",
                "uid": "f7bbd922-cf6d-4a1b-8288-99137830c958"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5356",
                "uid": "425bd040-cbdb-411e-977e-7911e25f29fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5785",
                "uid": "16da27f9-2609-466b-8f6b-b838ef936e77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-operator",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3773",
                "uid": "2ece40e3-4e8b-47d1-99cb-c795ef80d6e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3681",
                "uid": "8a2ab4cd-b951-46c8-8e7e-7261bbea31bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "system:deployers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3627",
                "uid": "a91efb14-bdb0-48b7-8f4b-0f23da66439e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3628",
                "uid": "a6beadeb-1ce7-45a8-8f7f-f457235f2e46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3626",
                "uid": "e27dabd8-2d06-49b7-a3a9-48c6760a0396"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "4880",
                "uid": "62f8ade0-3d0e-42a8-ae2c-edc0ca5c4ae8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5117",
                "uid": "e14431a3-5a42-47de-9e14-492a966fd221"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5968",
                "uid": "bd4ed876-bbc7-47bc-817a-53dc0020aa1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5674",
                "uid": "8cab7364-ca5e-47b7-8a8c-c220db2b3b50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5503",
                "uid": "8809ab16-b4dd-4500-9410-717903506b86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5572",
                "uid": "13addb4e-522e-4fca-a1dc-17dfc138b528"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6227",
                "uid": "1d886c2a-5304-4ef4-a2e3-05a1e2ea2e24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6514",
                "uid": "05d39a96-6030-4510-bfba-a80f5d5b7178"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6505",
                "uid": "32240078-39e6-4d5d-bb01-648fd53d6915"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5193",
                "uid": "be72ab4d-de23-4801-a31b-c5e86eb795e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5300",
                "uid": "f9fab75a-7a3e-4138-b533-66569d3654bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5867",
                "uid": "17207ec7-0739-4f30-9784-f9f820f52d27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:24Z",
                "name": "console-user-settings-admin",
                "namespace": "openshift-console-user-settings",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3747",
                "uid": "04744ebb-47c5-4a08-b211-d2c294fe6746"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-user-settings-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "system:deployers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3673",
                "uid": "1493fe97-3465-4f9f-a591-574922b6dfb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3674",
                "uid": "4652cd52-2ca1-4330-8e41-7dffec5029ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3675",
                "uid": "8c913758-76ca-4d35-8910-85394726a4a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console",
                "resourceVersion": "5070",
                "uid": "dc19e2cc-b3b4-4c8f-9a9d-69be8e87da05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console",
                "resourceVersion": "5148",
                "uid": "0beba6b3-e6cb-446f-98ab-5d6e89129d14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console",
                "resourceVersion": "6079",
                "uid": "3d05ef7c-038a-47a4-a996-01866609a1a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console",
                "resourceVersion": "5542",
                "uid": "3bd88de2-6e9b-4b6f-b541-1e33c3183cdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console",
                "resourceVersion": "5442",
                "uid": "a783d35f-c572-4d0f-8122-42d52e2e5f48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console",
                "resourceVersion": "5423",
                "uid": "a19b9225-2cda-41e4-8a3f-fee5170e9f1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console",
                "resourceVersion": "6189",
                "uid": "483131d1-22c7-43dc-a208-3abd89a175e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console",
                "resourceVersion": "6451",
                "uid": "5b55b846-10c2-4fa4-a4c8-6e64bbf1fafa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console",
                "resourceVersion": "6456",
                "uid": "49b68563-8e6e-415a-a92e-7d62540bb597"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console",
                "resourceVersion": "5218",
                "uid": "98d6e425-ad80-47b4-b0ce-08f843e1911f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console",
                "resourceVersion": "5249",
                "uid": "0ce8be9f-457e-4b99-80bf-fb1df01d43ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console",
                "resourceVersion": "5829",
                "uid": "5b4650c5-1111-4ff0-8626-395acead3313"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-operator",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3768",
                "uid": "b02034bf-df5a-4c2a-b98f-b667fb7b70a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3688",
                "uid": "0f942cfe-33f4-4a6b-a4d8-4753b9ada933"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "system:deployers",
                "namespace": "openshift-console",
                "resourceVersion": "3597",
                "uid": "573051a9-490b-4875-b25b-d07117508993"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "system:image-builders",
                "namespace": "openshift-console",
                "resourceVersion": "3598",
                "uid": "18d5ba12-918c-4e57-b4aa-dde1e008d30a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console",
                "resourceVersion": "3596",
                "uid": "90afa23f-1214-4db8-b4b5-3b5e97d7bf2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "4969",
                "uid": "84dde7d1-961a-4081-8afd-b5633db8e70e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5192",
                "uid": "c9d2c462-a125-4dc4-8ab1-8ecae6824504"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6071",
                "uid": "3205722b-b850-4ec6-bd3a-74359232c24e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5580",
                "uid": "90d10d84-8da2-4d8e-8ae7-bf34cdd23996"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5494",
                "uid": "922bf943-70ce-4a58-be03-bd725d2e4d10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5541",
                "uid": "c63cd2b8-b1df-4bd9-9700-fcb985055c8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6083",
                "uid": "c2a23bf9-5aa1-4596-9e80-66b70cbb88ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6517",
                "uid": "de858b52-dfbd-4978-b5bc-86aaa16e0b88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6389",
                "uid": "478ea12e-6a88-4f1e-989c-8b4d78b3a73c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5155",
                "uid": "d98307a1-2ced-48f5-a0df-e6f05c7f3a8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5318",
                "uid": "dc1ed3e0-ad67-4d47-bcbb-e441b2701c38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5946",
                "uid": "1dad7671-6222-4353-bfdd-648da06eda8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:37Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "736",
                "uid": "5ed83d50-fc47-4318-87e8-1bbfd885e399"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "2585",
                "uid": "1fcb5140-cc52-4f59-b18e-c9c620276133"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "2592",
                "uid": "bcab41fd-a99c-423b-b50b-8984e3a4f09e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "2595",
                "uid": "e472d324-7356-442c-a386-5c87cdfd3881"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5054",
                "uid": "e4184075-76b0-4b9a-bc93-8c2a8ee93aa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5151",
                "uid": "cf9b2d27-3c4d-4cc0-86f2-39fabe492ecd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6019",
                "uid": "19532c4c-11d9-459f-aee6-d5f657149725"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5784",
                "uid": "7de5c4b8-09e4-42f2-a8ac-41fb746d8b54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5508",
                "uid": "6fd0e117-da93-4dfb-9f34-c78e8ae664f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5515",
                "uid": "fdafe476-8618-4ee5-b958-896bb8345f4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6039",
                "uid": "da7273c4-fa18-49d9-8b72-050a0da48e9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6432",
                "uid": "44587b61-750b-4a60-9bcd-f051c7eb58ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6466",
                "uid": "fc9b2296-41e3-4b90-8743-2d771de58b67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5178",
                "uid": "e9c72dfa-08be-4b10-80ac-d84b798b1fac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5391",
                "uid": "e4cc35c7-5b07-4809-a58a-44165c3eca10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5982",
                "uid": "d902c638-ba23-4aa8-aca5-5bdefa400c61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "2588",
                "uid": "a02dccfd-6897-4c32-9b45-58397b5ec342"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "2591",
                "uid": "7c0743c3-6c36-43e2-bcd0-7f97b26692a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "2571",
                "uid": "bb519365-cd93-4a28-ac44-d0c84b7b2519"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:11Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6577",
                "uid": "0970cc10-77ac-4247-a4a2-a15c85de365c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6569",
                "uid": "4cf8554e-bf48-4031-9d65-1ff646647627"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6008",
                "uid": "1de633d4-5a7b-45a3-a5f6-b46d89f293aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6722",
                "uid": "b7afe007-902f-4205-bdd9-46ff23dac754"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6655",
                "uid": "c53c4b15-6fd5-40ce-80eb-2da95b36aedd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6634",
                "uid": "c7abbe32-74d7-4393-9ce9-de415efb8989"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6040",
                "uid": "0c2d1fc2-c5dd-4124-9366-5e824db46a17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6436",
                "uid": "3f03616c-fc0b-41b3-93be-3713bf2e60bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6337",
                "uid": "80c71b20-0b9c-40a8-9f5a-b38101def5c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6600",
                "uid": "f231630c-557b-4257-95f6-7af40f1b9578"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6603",
                "uid": "903c4273-f9fb-45eb-b8bc-9fbe7df46e2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5984",
                "uid": "1de66fcd-50a8-4124-8520-4ad30cd1de46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "dedicated-admins-customer-monitoring-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6671",
                "uid": "6e7df3bb-69c2-45e4-8b9b-3358b7ed0cc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:23Z",
                "name": "dedicated-admins-customer-monitoring-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6673",
                "uid": "5bb63b7f-43fc-46d1-9408-9bd9a03b4bb9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "dedicated-admins-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5728",
                "uid": "ac8e435a-9843-48fb-bf17-04f8062ab6fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "prometheus-k8s-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5724",
                "uid": "6ca3831b-83a3-403e-a2c6-a55f16fb2bb7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "system:deployers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5715",
                "uid": "2ca6b42f-8248-447f-95ee-52febf0c39f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "system:image-builders",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5714",
                "uid": "1b271809-80ca-40a1-9c08-ebd4d586cb5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "system:image-pullers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5706",
                "uid": "d0eb304e-1881-4b2e-a755-fa945990d783"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6537",
                "uid": "e6185c2f-608a-4c07-8a4b-98355e807865"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6543",
                "uid": "738d6167-1b23-4151-b61a-e4f2a720a34c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6020",
                "uid": "d0a39d0d-bd05-488c-8430-82a1d09e0181"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6723",
                "uid": "7091ba98-fea9-4910-8f76-b6081b8847ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6658",
                "uid": "fb219472-347f-411e-81af-8a84d465e97c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6628",
                "uid": "56aa1031-4e2e-4d2a-b632-33c27d532bc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6053",
                "uid": "51ebb689-b7f3-4ee8-82b0-b74238776a70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6348",
                "uid": "57c82790-0121-40eb-b546-de40f02692b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6363",
                "uid": "ad71b6bd-5397-4189-896b-488faf9382d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:16Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6615",
                "uid": "f2db80c3-0bfe-4646-a94a-3ec6f279410c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6624",
                "uid": "4d4da572-dd61-45ce-b1bc-c6989b1ec530"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5874",
                "uid": "219df194-57a5-4bd3-8508-3b712ab99d97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:50Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "ca5b21c3869491e79768d2cfaf75f947507507b9e3b372dfa4bf565390d8501",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "ca5b21c3869491e79768d2cfaf75f947507507b9e3b372dfa4bf565390d8501",
                        "uid": "9285f489-003b-40dd-8962-8159bb7c00f2"
                    }
                ],
                "resourceVersion": "12740",
                "uid": "8d8c3cd3-bf84-4189-8bbd-6c55b9aac76b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ca5b21c3869491e79768d2cfaf75f947507507b9e3b372dfa4bf565390d8501"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:56:22Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.568-g6f8f204",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "beNNEPNCBMnqobMI2YMXq9kNCLfRSRLBt47UqL",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-5YA1aCKquPNrz8HhLlSV6pmzk5bO0L7Eebnsrf",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                        "uid": "eae9e414-8748-4fad-96be-d55d4a4eeba8"
                    }
                ],
                "resourceVersion": "13605",
                "uid": "da9ab1ce-8046-493c-a10f-3177d17951bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-op-5YA1aCKquPNrz8HhLlSV6pmzk5bO0L7Eebnsrf"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:56:21Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "deployment-validation-operator.v0.1.568-g6f8f204",
                        "uid": "be8b0f82-8217-4402-a114-b9ea10e04aaa"
                    }
                ],
                "resourceVersion": "13483",
                "uid": "faa942a3-c69a-43ec-b52c-f8ea14a9fcfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-operator.v0.1.568-g6f8f204"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "system:deployers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5603",
                "uid": "2cf3268d-8077-4b65-802f-51ae900839e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "system:image-builders",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5604",
                "uid": "fdd90819-e62e-403e-a984-5b7f5e464e12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "system:image-pullers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5602",
                "uid": "8463b28a-07cc-49f7-9528-88e2b869a6a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "4978",
                "uid": "cf14bd3f-fa78-4813-b256-e159c1213e39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5214",
                "uid": "979b8cb8-9fe9-471c-abf9-ec275cbec5e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6010",
                "uid": "b8594d7a-1a76-4f58-81f2-020b207b3c4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5638",
                "uid": "42372015-d510-4adc-8928-5886b639a337"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5425",
                "uid": "5566dc44-ea4f-40c0-967a-feea18cf5efc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5502",
                "uid": "dcd0db2e-6be2-45a3-a9c4-8c1a7be5c465"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6033",
                "uid": "01e0552a-67fe-4fc9-a195-d7df1fdd91e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6424",
                "uid": "8b49c185-17f3-43e0-bf48-58703e248b75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6403",
                "uid": "9da28731-abd7-48a7-8dbe-c9c68a834dd6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5200",
                "uid": "852bd676-5382-4d60-a39b-a2b5d8af1046"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5267",
                "uid": "7dc806c4-fcd7-4fd0-afdd-41d271d8295d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6001",
                "uid": "d559e5d2-e48f-43a7-8375-9ee9e7d12375"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:42Z",
                "name": "dns-operator",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "934",
                "uid": "d134ac86-4cdb-4cb8-8aff-ef458109456a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:39Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "839",
                "uid": "8f6bd691-7419-434d-a56f-529593c9c0ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "2584",
                "uid": "ba3a752d-03b1-40b3-b88d-de85a3de551b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "2587",
                "uid": "35816c78-d3fe-413a-ad74-eb0799421d16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "2589",
                "uid": "5a5d90da-027e-4cff-8e27-08b3ad894ca2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns",
                "resourceVersion": "4882",
                "uid": "c95d9d42-7237-4456-a70f-8fdfee0e5c67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5138",
                "uid": "8e900e90-e309-418e-9c26-890f94225cae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6107",
                "uid": "49aba871-b132-4b52-9799-ae8eb66babcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5633",
                "uid": "7215c249-ba7d-4a0d-b21f-86af6042a38a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5520",
                "uid": "ac91f841-a084-4c5c-9190-8f28f6d9ee3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5433",
                "uid": "75eadff1-c98c-48d3-a2a2-241cbdbe058a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6153",
                "uid": "073618c5-9419-4d46-bc46-6b088b0fdb2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6340",
                "uid": "4b2591e0-587f-4ede-be5a-c0374b4c2a00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns",
                "resourceVersion": "6376",
                "uid": "d1c839a8-af7b-4ccd-87cc-f7fc85765eb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5299",
                "uid": "e230b830-744e-4826-b707-272d1a48cd4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5291",
                "uid": "35766781-1265-439b-8a3e-1ebb3b066e2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5947",
                "uid": "29bfe38c-13de-41cb-8214-9f28c3ce7ab6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "dedicated-admins-openshift-dns",
                "namespace": "openshift-dns",
                "resourceVersion": "4990",
                "uid": "50e997e5-1ea5-4b40-b5c3-76998f23e008"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-dns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:44:58Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns",
                "resourceVersion": "1601",
                "uid": "ce32dcf4-533e-40fb-90ee-1fa8a1322a28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-dns",
                "resourceVersion": "2586",
                "uid": "43aaab08-cef4-49f3-b938-10547944494a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns",
                "resourceVersion": "2594",
                "uid": "93451633-8635-4e01-ab8f-2b538c03eb92"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns",
                "resourceVersion": "2590",
                "uid": "52e46614-a970-41eb-b74e-2cddf5242da9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "4840",
                "uid": "4f8f9f83-efd0-4705-b38f-c3cb1518570f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5055",
                "uid": "98246050-232d-42b9-9c01-954a3a8ab95e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5999",
                "uid": "1397b450-9026-4e4b-b582-f041afcc0c68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5533",
                "uid": "2bfadfa1-cf8b-46e0-87f8-88188f34b663"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5450",
                "uid": "a58ff991-5405-418b-a22b-3f8540a32d40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5480",
                "uid": "ca42e4d0-571b-42e3-add0-48fbbe2b4418"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6055",
                "uid": "422bd129-5b2c-42c9-92f0-b8534d27995a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6370",
                "uid": "7422625f-8479-414e-a16e-4ccd1645429e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "6377",
                "uid": "3039cb9f-9ab2-4ea3-8cad-7a0886f4f468"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5231",
                "uid": "7ee0d46f-b32e-4838-888c-47c0356657ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5349",
                "uid": "b5e95b62-b5ff-4766-846a-6bfade430800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5877",
                "uid": "774f2d59-2d11-4e1b-b060-b569dfcc4669"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-etcd",
                "resourceVersion": "2611",
                "uid": "93d28d92-e6de-454d-a45c-0a9c94a71c15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-etcd",
                "resourceVersion": "2627",
                "uid": "346b0972-3262-47c3-8aa5-9bd2e86da165"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-etcd",
                "resourceVersion": "2593",
                "uid": "5ca6f441-6998-424d-8770-8b2395d584f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "17634",
                "uid": "c5c59f36-8a61-4fa7-96cf-6d4dbbe0a087"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18528",
                "uid": "727118bd-bce9-42f3-ba8c-6b38cf28e353"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18788",
                "uid": "e0a2dd34-5837-432a-a24f-fbfb5575a848"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:14Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18872",
                "uid": "02bc139c-4fc5-4bfb-83a9-a50a2fd7000e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:57Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "17990",
                "uid": "d0d7b946-fdb3-4e82-a899-4bbb4ebda714"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18076",
                "uid": "df533baa-fb6f-4abb-b130-4697a50f6a2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:53Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "17919",
                "uid": "2deab8cd-4866-4a83-9a87-fd2c57b37d1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18567",
                "uid": "a882e406-59e4-4f66-9e85-7c269c93c8f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:07Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "18710",
                "uid": "83b1ed9b-375a-4a42-966e-6b22ce3c5883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:18Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "19002",
                "uid": "677c2c52-bc58-4180-a30e-60abe869b016"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "19342",
                "uid": "a17f6148-f4b2-46c6-b76f-1be49ea45f99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18517",
                "uid": "aab1bd35-c9c8-49fc-bd58-90b1a6e5f6f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-21T11:01:51Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-applicationset-controller",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17804",
                "uid": "4dc7a0f9-d85a-4fd5-8a2c-4270efd4430a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-applicationset-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-application-controller",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17588",
                "uid": "97db9d6b-1bf0-41b1-8c1e-00c2137fd189"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-dex-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-dex-server",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17547",
                "uid": "7f929b61-69d5-4e79-b707-f2e64968c090"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-dex-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-dex-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-redis",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-redis",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17639",
                "uid": "b502e005-bc9e-4d95-8d71-565f99980f77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-redis"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-redis",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-redis-ha",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-redis-ha",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17626",
                "uid": "6e4ca84d-fa93-4113-9f32-e16b19138c82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-redis-ha"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-redis-ha",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-server",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17610",
                "uid": "c8a4ddb2-d1ff-48d1-bb08-437c64daef09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "name": "openshift-gitops-prometheus-k8s-read-binding",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "39177f95-b7ed-4999-bff7-23ce12c4f9c6"
                    }
                ],
                "resourceVersion": "17512",
                "uid": "b74a5ad4-eeed-4502-89b3-3eb2440dd728"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "name": "system:deployers",
                "namespace": "openshift-gitops",
                "resourceVersion": "17497",
                "uid": "a87f9dbd-e35a-4735-a158-76aae9e05432"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-gitops",
                "resourceVersion": "17498",
                "uid": "ce7300f1-9a2b-4431-b173-6a4818d33418"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-gitops",
                "resourceVersion": "17499",
                "uid": "106ab6f4-e173-42b5-9664-4decbcf13e05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "4925",
                "uid": "3847bcfe-5022-4820-a763-bcb9a3c40ff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5194",
                "uid": "6b5628e4-5c29-4e53-957a-50d0b0961f28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5972",
                "uid": "14bbd853-c667-439b-bce2-2badf8f980b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5726",
                "uid": "e724281e-0113-4247-9818-08dd3a63cf12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5390",
                "uid": "c0be8ee9-482f-45b7-9f2f-80f281372901"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5473",
                "uid": "0257acdb-7c6b-4ba5-83e2-96a3d6d81fb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6042",
                "uid": "41236d14-8215-48fe-97a6-aee13c691dd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6469",
                "uid": "344f79a9-89e7-482e-a728-abd37e65fe37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "6428",
                "uid": "0b0b3041-17be-4cec-ae87-f4732e3353d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5309",
                "uid": "329e663e-df77-42a0-a54d-f105c3badbd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5271",
                "uid": "8bd4ff60-a9c8-4bfe-a433-5a86293eefea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6003",
                "uid": "d9e3d4ef-20f9-43de-afe7-8c1eb36bab36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:30Z",
                "name": "system:deployers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3952",
                "uid": "1d4a6c7b-2fcc-4809-9322-b3d7b479f110"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:30Z",
                "name": "system:image-builders",
                "namespace": "openshift-host-network",
                "resourceVersion": "3953",
                "uid": "a3307f15-8ad0-4e3f-8733-1109af292911"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:30Z",
                "name": "system:image-pullers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3951",
                "uid": "64d2b215-5812-4122-a001-8a2d2085aa23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5073",
                "uid": "243057ae-fc83-4af1-8289-98b65c272eec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5163",
                "uid": "54e2201b-0215-415e-a508-0d11ab89bbcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6023",
                "uid": "740d493a-955d-4c39-b6ac-00dfa4848727"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5640",
                "uid": "0b9ad57c-9aeb-4a31-800a-56ad09e4fb49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5402",
                "uid": "8ba71630-a219-4572-82df-487b141d03ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5543",
                "uid": "123ac962-e160-4eff-ba0b-09780fb23616"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6096",
                "uid": "8bc565a7-cd7e-4ded-90d7-fbb51c5892ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6502",
                "uid": "86dfdf84-7dce-48db-a743-465f04954e93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6380",
                "uid": "fc03f23a-75c2-4ff5-ba35-9136138f42ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5201",
                "uid": "a1eee47c-e6e2-447a-99f8-9837a1828371"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5320",
                "uid": "5c9d5fb4-f0bb-4c7d-be59-00d67e92fc8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5965",
                "uid": "8d3c5f0c-8e67-4460-9673-1e497b307e94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:55Z",
                "name": "cluster-image-registry-operator",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1380",
                "uid": "cb835741-87ea-4638-8155-69e44b01bfbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:57Z",
                "name": "node-ca",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1513",
                "uid": "401300e1-b413-4171-89f1-ad75d2924672"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "node-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-ca",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:40Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "875",
                "uid": "a878a62a-9061-408d-9a5d-f47946fd285c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "2633",
                "uid": "9d21a454-b41f-411c-b386-786870239e5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-image-registry",
                "resourceVersion": "2636",
                "uid": "85fff716-0d6c-4777-a621-d6ab506e3fa4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "2612",
                "uid": "a9350fa5-dfb2-47ad-a379-9b3d3988f6a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5076",
                "uid": "1960a373-6430-46a6-af04-b155999241b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5166",
                "uid": "b0710fa3-9a21-455a-be83-3d14de093bc6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6081",
                "uid": "49a58d45-8c80-41f5-97f4-72899f190810"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5534",
                "uid": "a02a8829-1d96-4112-94d1-b069e51399de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5512",
                "uid": "426a8ebc-4633-4937-825d-b154c05ae9c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5446",
                "uid": "5feead41-849e-462e-b973-8e2449788b77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6218",
                "uid": "7d59bd01-4dbe-48c0-a8c9-06637dce2575"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6373",
                "uid": "5f6058f8-22fd-401e-bee0-d839d79b4be6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-infra",
                "resourceVersion": "6491",
                "uid": "09d2d677-eccd-4b06-a108-68b2d9b62caf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5171",
                "uid": "e7d91cbf-613a-4f77-84f3-1efa604c2372"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5245",
                "uid": "9df417e5-35db-4920-89bc-7a985d783177"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5907",
                "uid": "18181239-9eaa-4856-9fe3-2a9866754809"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-infra",
                "resourceVersion": "2628",
                "uid": "e3b7e633-f519-44a8-b475-9a748f7b7c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-infra",
                "resourceVersion": "2626",
                "uid": "b6ade63e-dc3b-4213-9f76-0a5705ff91f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-infra",
                "resourceVersion": "2630",
                "uid": "9fc64907-7adf-49a5-886c-3b360a40b190"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "4884",
                "uid": "acb87e06-d3b5-45a4-827b-028063364d95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5182",
                "uid": "1bae632d-9380-4df2-9694-0fc6c83be920"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6104",
                "uid": "607991d9-6df1-4057-a9f3-a922190d6102"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5743",
                "uid": "4fc6a70c-c1fe-4f5f-a85c-174b6a578371"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5453",
                "uid": "423b3b23-519a-40c1-b252-995e4a7a28f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5555",
                "uid": "54ad68d1-58e6-410b-9647-1f5752455cac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6155",
                "uid": "4d4ca8b4-c405-45aa-a42e-faae3f90ef03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6375",
                "uid": "e24fe5cb-fdc2-4be4-bb33-992a5fb96287"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6349",
                "uid": "c778ccfd-a190-484b-98b6-001c59181b28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5244",
                "uid": "44304bd6-8f42-4ca1-bada-56308dbe3c06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5252",
                "uid": "5c44d326-6923-4796-8714-ffd8497857b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5880",
                "uid": "1dd37842-4505-4a87-8a98-19ef413f6dea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:11Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3114",
                "uid": "6e054443-1818-4bad-a2b1-254256f613b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:11Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3113",
                "uid": "3f7cc84e-37f6-49c8-a77a-6a2a737978c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:11Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3134",
                "uid": "2f3054fb-909b-482b-900e-dc624c7cdaaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5079",
                "uid": "8b89ed48-6688-48ed-877b-a011ce60d3af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5169",
                "uid": "ab748cf4-16b8-48d5-9e05-19cc0b837d8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6057",
                "uid": "ba435de7-6439-433f-9dba-40e7d825abf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5765",
                "uid": "2532c317-2708-449d-beb9-b863bcc3ccce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5483",
                "uid": "5e3721e7-b15a-4aed-a931-b2066f0e210c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5436",
                "uid": "a8d868f4-a74a-4447-82ec-1a34a519a4da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6062",
                "uid": "ade2d779-7828-4da3-ad4d-7fd4cf49c1f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6519",
                "uid": "8208ab5d-1cd9-44cf-ad0b-f864d7c27266"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6367",
                "uid": "2b9876d7-5286-43dd-aded-59f986e78c9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5157",
                "uid": "1c76a96a-d0bb-4e78-9453-0e551b25d728"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5384",
                "uid": "b3d88c99-7578-42f1-b1c2-9218997317ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5958",
                "uid": "770eab51-9c17-4cea-8e48-944999363778"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:51Z",
                "name": "ingress-operator",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1268",
                "uid": "06745b49-9efa-4d76-98a9-4ef2266fafec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:13Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3262",
                "uid": "baa6cf5b-4bd5-47ef-8da4-6c3d46c59ce3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "2625",
                "uid": "836b7950-0579-4514-b63e-eee02a046507"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "2637",
                "uid": "02dcdc7c-d2f6-45b5-be25-d2f7afc168ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "2631",
                "uid": "ed61b3c2-3e1d-435b-9673-39f6e7129542"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5061",
                "uid": "f401d099-cc37-4203-8dc3-d59725a58388"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5140",
                "uid": "cff04d04-4c02-421f-885a-42ee36188bd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6025",
                "uid": "6cc394fc-7947-4832-93d5-128b6eb730b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5727",
                "uid": "13d1ef0c-7d84-44c2-bed3-aa5f333c6d14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5370",
                "uid": "9fbc3753-3e47-47dc-b5a6-472ab453fd5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5573",
                "uid": "bc106bf8-4bec-45ca-9c3b-f8a1ad716708"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6058",
                "uid": "c473a476-de98-4e4d-ae25-f12fb161ff35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6492",
                "uid": "3ea0786b-3631-48e2-8743-947f3d0d0138"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "6419",
                "uid": "bdd97cc8-6913-492d-b526-f5a2f1bbfc85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5180",
                "uid": "f60f0bcc-0325-45b8-8bcf-3cbb11341cc3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5410",
                "uid": "f18aa0f7-318f-49cf-8530-12946001d7b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5789",
                "uid": "e0e6865c-85e6-46fd-a3fa-7f5db0cd2637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:13Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress",
                "resourceVersion": "3232",
                "uid": "cf6014dd-a92d-4d99-9dd5-fdf346a844cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress",
                "resourceVersion": "2635",
                "uid": "eda5f2a2-2dfa-42fa-bbe1-b6ebf96455b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress",
                "resourceVersion": "2634",
                "uid": "c0899634-d6dc-40a3-9a32-c26209f86373"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress",
                "resourceVersion": "2629",
                "uid": "a9ee0cf9-7de9-4ba4-9fd3-3c4524dcbec2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5042",
                "uid": "f27b9474-fcba-4284-b30c-13488a7b13f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5131",
                "uid": "69bac968-1bfa-4372-aa85-e254798126c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6118",
                "uid": "ae7aec2f-aa0c-4963-8375-ccd01a3bb555"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5678",
                "uid": "70500ed0-4e39-4c18-a21c-e098ba70d2fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5404",
                "uid": "21edf41a-8055-4672-abab-2654bdf70155"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5558",
                "uid": "a4d715be-8fb1-46a8-aec7-0e603a206fd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6267",
                "uid": "caac49ca-c2f5-4689-9a48-75255aa8a960"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6397",
                "uid": "f365ce5c-c6e4-4e7f-ba00-417b09e0e737"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-insights",
                "resourceVersion": "6458",
                "uid": "e414d7d9-d5bf-4e1d-bb9c-a4fa5375f542"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5283",
                "uid": "23e8ffdf-84b8-4f98-af60-97020fbcec17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5393",
                "uid": "759e10b0-8940-47d4-8e5d-f6ad088a654a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5952",
                "uid": "50b664ec-767a-4bff-953e-53ac31cadc8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:56Z",
                "name": "insights-operator",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1480",
                "uid": "89c634c7-82b7-4470-bbf3-ea0d3fba98ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:57Z",
                "name": "insights-operator-obfuscation-secret",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1548",
                "uid": "69191a6f-881c-438b-8bc8-62753d343f0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-obfuscation-secret"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:00Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1732",
                "uid": "4d0cbcd7-0ac6-4332-912d-a51ff09af7b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-insights",
                "resourceVersion": "2651",
                "uid": "c7c03ef4-7cb1-47bd-abc8-c090da4995f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-insights",
                "resourceVersion": "2664",
                "uid": "7144068f-0add-4c0b-a895-c51eefe09f91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-insights",
                "resourceVersion": "2632",
                "uid": "28adb59a-ec50-45d2-bf10-a97958d47961"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5044",
                "uid": "143ad48a-bed7-4f07-b69f-8581037b21b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5170",
                "uid": "1f629cb8-6323-4264-ba08-4cd553fe8343"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6114",
                "uid": "61700379-b995-45f0-9667-9e59a2125482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5545",
                "uid": "e18397ad-0927-466e-8304-be74f0d90e95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5522",
                "uid": "f067538a-9004-4ff8-806c-44a607fbcc9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5547",
                "uid": "50d83f6e-6502-48ec-89bc-af2a899ddb61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6035",
                "uid": "25715964-13b8-4865-b248-efd26ff6c8d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6496",
                "uid": "37e2d5a3-e1e9-46cd-90d9-fa3941f59813"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6431",
                "uid": "5cc1066a-848b-4f24-88d1-cbf88259a04e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5177",
                "uid": "b94cb96e-f2be-43fc-bac2-6da2e66ba79b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5293",
                "uid": "53a773df-9308-4b83-b681-be0b90fde7fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5902",
                "uid": "b89a8f26-ff3d-4b5e-ba11-516bb96c56bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:14Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3290",
                "uid": "98c63d31-3fd4-422b-87a2-e2c72b83c104"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "2670",
                "uid": "47706a0f-7003-4d2b-b1b6-57f1b63711cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "2669",
                "uid": "090f89f0-985e-44f3-ae16-c02fccc87e75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "2666",
                "uid": "a4c85f2b-8f53-477b-8694-ead2e517952a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "4928",
                "uid": "13a69eec-c937-4518-a6c3-7b000b80cf2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5090",
                "uid": "3b52af81-9540-4977-aa9d-073523aeabcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6012",
                "uid": "505b407f-ec3c-40e9-9ed5-3cfa767dbeb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5605",
                "uid": "26b2d8a9-08d8-4565-a027-ecfef75bd887"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5454",
                "uid": "627e0075-1204-43ca-9e5d-3e571c36198c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5516",
                "uid": "dfab5f4d-6b10-47b2-92df-6936fe5bf724"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6086",
                "uid": "41e78c81-a759-4c4f-8037-8fc2d034432d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6526",
                "uid": "c87f73e4-a43c-43f0-b836-6b89c5f22294"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6508",
                "uid": "38e7bab5-de09-4ecf-82c0-19ee7b466d9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5174",
                "uid": "ed9d1c8e-9c55-4374-9df0-dd743c7f5775"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5359",
                "uid": "cbe02800-4ee3-4b9b-99d2-e1a2f0e266b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5969",
                "uid": "306d705f-2098-4025-b6dc-5e62a28c77ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "2672",
                "uid": "e66f7a46-26d0-42aa-a86e-09349eaace69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "2673",
                "uid": "4b8efd43-8174-4bf1-95f6-5eed9c6d72af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "2652",
                "uid": "b9c349ae-1790-4143-b2e5-b5efcdc90fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "4958",
                "uid": "77095dcd-ae0e-4236-9f6e-903878c7a02c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5172",
                "uid": "767764d3-f58a-4ae1-9f52-589ba9ea5873"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6013",
                "uid": "b1b115a3-87a2-4b48-bd95-ef5d59be1948"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5707",
                "uid": "2abaac78-9558-4661-9c71-8506cd8c2bb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5470",
                "uid": "6b3d5008-5ef9-4689-bcaa-9a02aa5fcb74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5486",
                "uid": "9858998e-9fac-4d3d-8bcc-57b4bdb47a43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6106",
                "uid": "b04c31fd-cf5a-4d0a-9934-d2b07e6e965f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6453",
                "uid": "dc513b17-65ac-4415-83c3-bc183745103f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6498",
                "uid": "713640d6-2f31-4c91-b2b9-775ee3643224"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5213",
                "uid": "2a681725-8c35-442a-8ae1-00c784a0a4ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5399",
                "uid": "2fe7c9a6-5dae-4bb2-b539-836ce3a7f8ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5855",
                "uid": "bbe54541-8d59-4588-9052-333494cace0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:37Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "737",
                "uid": "c7152af5-5fe3-4dd5-bdf1-4da8527ca2c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "2665",
                "uid": "e45d47ce-17d6-47d9-8883-b4e9a2c768d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "2668",
                "uid": "7d29007b-e611-4d80-98a2-4d3cb08540c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "2667",
                "uid": "0681af1f-03cc-409b-8c34-b2ffe95e57b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5032",
                "uid": "3d4d2435-6b39-4355-8151-4ff507fad652"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5217",
                "uid": "f4ab1be9-a27f-43c7-8876-5570522b2461"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6099",
                "uid": "33ed71ba-447d-4ffe-86c2-d6ea14c519ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5730",
                "uid": "817d4d39-949b-4ae3-aa32-a96d852ba00d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5526",
                "uid": "3ca654ab-5789-449b-9ad8-c3abef6ab108"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5519",
                "uid": "704c26e2-af6f-4586-abdf-f6f39dffd992"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6089",
                "uid": "246cd9a5-0897-4d45-913e-61922dbfbea1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6480",
                "uid": "87199642-db7b-410b-9ffd-39a3bcd3e411"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6509",
                "uid": "672c8f37-3b59-47a1-a140-58edf993fc36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5248",
                "uid": "bd31fd7e-1ee0-4723-9af7-8f8fe0a861b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5295",
                "uid": "c614dee9-a5bd-4a16-b9b1-28aab9cf60d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5961",
                "uid": "f9dfbb9e-fa93-4b72-83d8-d91307bc1d2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:00Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1681",
                "uid": "ae5d1c95-37ea-4c7c-9013-c471c04ec9c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "2671",
                "uid": "4cf08272-57d5-4b0f-98a9-7a88d972aa42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "2674",
                "uid": "24ecca0f-ebdf-4618-8d59-cc24d319eb02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "2675",
                "uid": "1d22c277-9ffd-4e39-9bf8-e7aee3b28adf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "4885",
                "uid": "ec96d598-7edd-4e0d-963f-ad85c7b72764"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5234",
                "uid": "42d2e486-c413-4c44-8762-a35331a827b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6034",
                "uid": "29fb62b0-f112-4bec-859b-36888713987f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5652",
                "uid": "754ba919-fbc3-4800-96c5-1e8e27405215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5485",
                "uid": "f653b173-e1f2-4ea3-8f84-50e80c98cffb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5553",
                "uid": "cea6a33d-8650-4998-972d-f4b20c82d97e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6191",
                "uid": "123cc1b0-d150-45a6-9755-061e2f8911a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6472",
                "uid": "96c1c75f-4b5f-454a-be8b-27ad5390837b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6354",
                "uid": "966fda2c-21d6-466a-924a-5b32987b3d0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5285",
                "uid": "dd5a1e2e-9c6f-43b1-8ac2-545c54f75de5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5324",
                "uid": "ab4d381e-ce61-481c-9d0a-193ff6a5d805"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5918",
                "uid": "418b3eb0-c495-42d4-9454-b24ed8142fcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:36Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "730",
                "uid": "4b7eea34-c39d-47c1-98de-d572bc407091"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "2710",
                "uid": "a22d153a-3218-4c42-8038-2680a31ed57c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "2703",
                "uid": "07b177b2-3669-4fad-a673-983901ad4f93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "2689",
                "uid": "a59c596a-3bf1-4731-8524-44441382c34d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5045",
                "uid": "540e98c7-3e46-44aa-a223-ce97d640210b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5074",
                "uid": "7d23e865-8b95-4c4d-a1b6-76eb2ab3c89d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6074",
                "uid": "8e46811e-4dde-4b86-8501-1d2869b95d7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5767",
                "uid": "ed9e06f4-ba69-47cb-a250-5fd183482b2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5491",
                "uid": "018c692f-729a-4cb5-9b8a-252b1dddeb3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5551",
                "uid": "4f8b51ba-a11d-44eb-8eb8-67b852fe45a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6220",
                "uid": "705509ca-28a8-44db-8ecf-bf1765f68c81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6499",
                "uid": "2757d2bf-ea67-417b-9ac1-01cb32cbc18c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6381",
                "uid": "1e3d0482-8e6a-4ae4-a7de-5334e9a20d5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5301",
                "uid": "813b150b-0dc7-4d84-b308-5f1457a7b942"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5246",
                "uid": "d11e0c20-baa8-4408-8a00-90317a5c5308"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5916",
                "uid": "a9a0f7ea-61b4-4605-8f22-6199aa8c2110"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "2690",
                "uid": "691c0112-de6a-4ad6-89c6-d328468b3069"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "2706",
                "uid": "08ac238a-0bd0-4a9c-9e50-7c052da78ea2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:06Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "2663",
                "uid": "9fc294d9-0362-4f00-bc52-88f97f106278"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5040",
                "uid": "8d4ade03-8767-441c-9e2a-bc07dffd3544"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5195",
                "uid": "6ec0aae8-7008-41bb-b397-c00318234de8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6082",
                "uid": "9ae4c842-c390-42dc-85a9-86e009460381"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5732",
                "uid": "5a187f3b-9671-4e0b-aeb0-a36d8979ee10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5447",
                "uid": "c31f6a43-4c42-4df9-acbb-568ddb6a22d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5507",
                "uid": "dccf7912-0ccd-4662-a0b7-383a22b24181"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6046",
                "uid": "1838f693-8ba5-4021-8382-0e35956bc583"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6351",
                "uid": "979dd562-3f88-4753-9d4c-eb141dcd1001"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6369",
                "uid": "9137c8d5-915a-4b70-bdec-5bd5cf9bcd5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5292",
                "uid": "b639ad16-cb6b-43b8-b983-f339b59dea4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5247",
                "uid": "b29aec95-4923-48a5-a831-d017ad04a179"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5862",
                "uid": "8f132538-d66e-45ba-b609-03af8c89a223"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "2707",
                "uid": "9078a736-a2fa-4a8f-a07d-935a5808f201"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "2712",
                "uid": "7c96e25e-81d8-4250-bf2e-619f258b4ec2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "2704",
                "uid": "f11336e2-f4b3-48d6-8b68-50b5c5f0c1d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:41Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9594",
                "uid": "592cedce-cc0d-4a15-9d5f-4cc89534ea76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:49Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9745",
                "uid": "781409fd-e449-4678-8b0f-15c47e2b4f41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:28Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9190",
                "uid": "9afcd61d-7a3b-45f9-8e61-4dc120ed1b0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:56Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10151",
                "uid": "24cf97ba-945b-4dd3-95d3-7c6ceb134603"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:44Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9666",
                "uid": "f9f10e2b-3632-49c0-b626-aa69cf885473"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "10152",
                "uid": "8b9a0c4b-4893-42b7-ba18-03ffe74f91b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:38Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9513",
                "uid": "730d480e-aa40-4612-9f4c-f0fcf5955aba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:28Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9170",
                "uid": "539b380e-358e-4805-860d-7768e59b5365"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:32Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9336",
                "uid": "df0fde5b-1dd9-448c-87f4-b7d1f875da65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9711",
                "uid": "3c1151cb-0bd7-4daa-a029-72938b2ccd14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:36Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9468",
                "uid": "09a3d18e-4694-4d81-82f9-d5c77c9fedf4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:50Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9751",
                "uid": "2c6c5615-0fb7-4e51-9515-677cdd705cbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:54:28Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9184",
                "uid": "a025f080-b1c1-4d9c-a2fc-f1abe7eaef3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:54:28Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9183",
                "uid": "0fc79999-404a-4767-bc33-5a3a0e807e76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:54:28Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "9185",
                "uid": "0283e5e5-a523-43b8-a240-dcdeb9c97388"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "5858",
                "uid": "bd91255f-dba2-43d8-a23c-61de2a49c621"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "5861",
                "uid": "9f9ff3df-b47e-4eb4-add5-fed817419da3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6555",
                "uid": "fbfa334a-60e6-4f39-8784-70b4c02af5bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6533",
                "uid": "bbb1701f-caf5-4261-94b6-15f6e515a580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6044",
                "uid": "7a4ad4f8-7288-493e-9fcf-06c13d3c61bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6689",
                "uid": "6f7cd3a3-a0ca-4436-8f95-d31cc6697244"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6633",
                "uid": "d1c3e716-a5ba-47ec-a98b-d908d3b48b87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:19Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6639",
                "uid": "607d6833-47fe-470d-880f-8fec0c9765ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6228",
                "uid": "9537b141-01dc-4f47-bfa2-49cab1825b3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6482",
                "uid": "90d2726d-c458-483b-aaf1-735e0daf925d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6383",
                "uid": "f60240eb-9465-457d-a211-501bfff41208"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6610",
                "uid": "4d0e101f-6ac6-43aa-852f-963aa56d48c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6611",
                "uid": "555be17c-54c8-45f5-aa91-e4fd4605d002"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:26Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6701",
                "uid": "a58f5d5b-7699-4b6d-957b-a63891fd4317"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "openshift-logging-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "5866",
                "uid": "bfcc4d4f-b5b4-4595-afdc-a268bbc898a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "openshift-logging:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "5871",
                "uid": "2a155e67-aceb-4b30-b867-16f72997c388"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "system:deployers",
                "namespace": "openshift-logging",
                "resourceVersion": "5853",
                "uid": "7f7f071e-7e20-4f8c-907a-954e67c55022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "system:image-builders",
                "namespace": "openshift-logging",
                "resourceVersion": "5857",
                "uid": "44f5c6b6-8f2f-4151-b9d1-cd9c2fc94463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "system:image-pullers",
                "namespace": "openshift-logging",
                "resourceVersion": "5856",
                "uid": "5ab77a18-0332-40bf-a1f2-ad69ff3592e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5033",
                "uid": "0a4c344f-c80d-4e33-a3a8-87b55db9045a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5175",
                "uid": "7dd5de70-f865-4e7c-8589-c4963992c191"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6060",
                "uid": "4df56a7f-d28a-43c0-be4b-e45e406df459"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5770",
                "uid": "e6656dd1-3166-4c4c-b571-7cedf22e4870"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5392",
                "uid": "9ac4c0fe-5f5d-4231-a18a-e948953ea266"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5498",
                "uid": "6724f7fd-2930-421c-beae-8de0dcae683a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6158",
                "uid": "01b4deeb-af81-4936-b5c7-eb1e0ad22c82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6378",
                "uid": "50aa98f8-9184-400c-b79c-a7599e94ce0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6339",
                "uid": "a80e4000-8221-4d64-a6c4-be93b14adec4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5216",
                "uid": "8cfd2dd3-35e8-412d-95ae-72b3fbe110d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5412",
                "uid": "89c8fa0a-43ee-4541-8e04-83d784401f46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5962",
                "uid": "e24ae921-a6f8-46f4-b719-8ed77c2d152e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:47Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1070",
                "uid": "efd2a275-e386-45bc-aa79-98faa3e98607"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:38Z",
                "name": "cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "815",
                "uid": "50347453-254a-475c-86c7-64ed477ddbd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:47Z",
                "name": "prometheus-k8s-cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1085",
                "uid": "7e39c150-7fcd-44de-997a-d753c7d8b2c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "2708",
                "uid": "b5653f2f-c687-4141-be9d-218fc266f09d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-api",
                "resourceVersion": "2700",
                "uid": "8565bde8-a323-4f4a-b127-082a71c8631d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "2711",
                "uid": "af6530d8-395f-4776-9100-a0f90707ccea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4981",
                "uid": "d1200e85-d479-4550-b78e-e7d6830a32c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5134",
                "uid": "7c50aaa0-0180-4681-89e1-18fcd68273f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6048",
                "uid": "76c6e2e9-5ee7-41fd-a26e-1921155bf8ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5788",
                "uid": "5d4841e2-3cd0-4a75-b522-8ca1746b30fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5385",
                "uid": "7fd1b0eb-ecfc-4ba8-b11a-35bfcb24fac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5527",
                "uid": "8f0b6e09-6d2c-4d41-9536-2ee4cfd69777"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6154",
                "uid": "95f68d43-5072-475b-872c-0f3dbb30ffb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6474",
                "uid": "3013a17d-5336-42cb-8e5b-f803b5ab3c73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6434",
                "uid": "e3fc11e1-c668-437e-9a04-ca2b42f98829"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5237",
                "uid": "25839d1f-d035-4d74-a61a-a067aa2346c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5418",
                "uid": "fd78b2af-6e60-4ba0-a01a-d08858ea6a51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6005",
                "uid": "ef03bdcd-f3b0-4383-946e-ac1ff0ba0b95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1251",
                "uid": "00a1a958-710e-4abc-82eb-a29c28e2dfcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "2701",
                "uid": "9b5573e1-18f7-4787-9776-5e4d56845bdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "2709",
                "uid": "93c3fdfd-3287-4a56-b810-f60d0b8ef2a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "2705",
                "uid": "9994a963-cc1f-461d-8501-f92109016335"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "062b85eb8d31762de8669535a88ce29f531b40a99da464704a349df5a226794",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "062b85eb8d31762de8669535a88ce29f531b40a99da464704a349df5a226794",
                        "uid": "002146a8-cb80-4184-8432-8da7b429dfd5"
                    }
                ],
                "resourceVersion": "15605",
                "uid": "d2bc06f9-4ec9-4f7c-8e62-27c38dd0a185"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "062b85eb8d31762de8669535a88ce29f531b40a99da464704a349df5a226794"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "18ab2eaa607a00575555d3d5b97fe3206aa96262fc8b848ad325c51ad7ad68a",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "18ab2eaa607a00575555d3d5b97fe3206aa96262fc8b848ad325c51ad7ad68a",
                        "uid": "91fa3894-af7d-4b0c-a15a-fe29320e0191"
                    }
                ],
                "resourceVersion": "15643",
                "uid": "80bbb42b-e2be-4f46-93a3-f1c0ecaa6a51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "18ab2eaa607a00575555d3d5b97fe3206aa96262fc8b848ad325c51ad7ad68a"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:06Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "53634cc716e3784f8e237b128ae14253d65dd14b0e9dcd086f5ff88ece6e8a1",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "53634cc716e3784f8e237b128ae14253d65dd14b0e9dcd086f5ff88ece6e8a1",
                        "uid": "f1fd9f80-0e6f-407b-ab30-4686167821ed"
                    }
                ],
                "resourceVersion": "15521",
                "uid": "c6377b72-878f-4541-a73b-3384ab682b65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "53634cc716e3784f8e237b128ae14253d65dd14b0e9dcd086f5ff88ece6e8a1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "89713d7f0982bbbe86fb208a625bc57b19d0bfe85155390887d6f32ecaa4b34",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "89713d7f0982bbbe86fb208a625bc57b19d0bfe85155390887d6f32ecaa4b34",
                        "uid": "2135ea24-6c25-4546-8cc7-dfd709442858"
                    }
                ],
                "resourceVersion": "15618",
                "uid": "3af16d78-9622-4d9c-a94d-ab57ed8febef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "89713d7f0982bbbe86fb208a625bc57b19d0bfe85155390887d6f32ecaa4b34"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:06Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "a54ee9eda2828a12414ea519ebe1984caa1e89a473cf1b21256364ccf2cdca9",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "a54ee9eda2828a12414ea519ebe1984caa1e89a473cf1b21256364ccf2cdca9",
                        "uid": "80955a9b-ed7c-4bb2-8d85-94a67493835e"
                    }
                ],
                "resourceVersion": "15508",
                "uid": "0331ac43-ca97-48dd-9026-f6bd24032766"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "a54ee9eda2828a12414ea519ebe1984caa1e89a473cf1b21256364ccf2cdca9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5082",
                "uid": "c0eafb9b-e90f-466b-8a66-f2dde1fc5b8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5238",
                "uid": "a6b21e22-3af0-45d6-97b4-47002c0f6df0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6016",
                "uid": "ede6fcc5-5ea0-4cd2-9dd6-0ca6a39442eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5774",
                "uid": "aa982187-bd99-4fe0-97c0-06ea30c9a8cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5413",
                "uid": "4690d0d2-6659-4f69-8d6b-a32ff9c8d3a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5500",
                "uid": "389011a9-6443-41ec-b3b0-7474d328a56a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6231",
                "uid": "b81eb4f3-79e4-42e1-af78-f3c2509f7be7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6361",
                "uid": "c60da27d-bb8b-4a28-ac61-37a11fa9196c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6341",
                "uid": "95333fb8-620c-4c50-96c7-715f893a94b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5303",
                "uid": "f198ad89-8aba-433a-b744-69c154d2b8e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5325",
                "uid": "2c9b2642-838e-47ec-9ef6-2c0669c161d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5790",
                "uid": "5911d489-b069-4ad9-9342-fa232ff06eec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "dedicated-admins-openshift-marketplace",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4983",
                "uid": "b6d435e4-7d6e-4e60-80f0-0a68a57f41e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-marketplace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "ee95c2ebdb0ff63884cbb5f1a170f2114ff6dd7128f83b029aa76ab0b492bdb",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "ee95c2ebdb0ff63884cbb5f1a170f2114ff6dd7128f83b029aa76ab0b492bdb",
                        "uid": "c3445534-1656-4ce0-a826-7add622a8838"
                    }
                ],
                "resourceVersion": "15630",
                "uid": "8d015edb-b845-45f4-8866-631eab963458"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ee95c2ebdb0ff63884cbb5f1a170f2114ff6dd7128f83b029aa76ab0b492bdb"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "2725",
                "uid": "51108a13-ba6c-4947-8e81-9938cb2c6cd4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-marketplace",
                "resourceVersion": "2741",
                "uid": "335dfcc2-6f54-494b-b5e0-7d8fd1e0042f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "2702",
                "uid": "4c59e72b-89c9-4a2c-8372-99213f6a19fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:46Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-prometheusk8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12465",
                "uid": "1e93c96a-b250-4003-b011-629bf161eeee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-cee",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6224",
                "uid": "aa8fada9-54d2-43cb-9a72-4400562f19e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4961",
                "uid": "953377db-ed32-43c1-b6f5-de4669c42e68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5099",
                "uid": "6fbbc5b8-a3bf-4402-ab63-08186622b85f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6116",
                "uid": "d0519ef5-13be-4a37-91d0-c37392a83c5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:02Z",
                "name": "backplane-lpsre",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5024",
                "uid": "cc5b68b1-9dca-4f88-a2e2-bdbf62e4a458"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5745",
                "uid": "de219b6e-5d0c-4c66-9f94-cb9034cda512"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5514",
                "uid": "a9660f74-b3a7-421a-b08b-0f70da138639"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-mcs-tier-two",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6324",
                "uid": "b3227d8b-5565-4e0d-8023-e62d1f51e9ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5487",
                "uid": "b578c181-99f7-4687-a59f-2c849b6b66f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6065",
                "uid": "b8869aca-b64b-410f-810e-2e83423557df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6440",
                "uid": "0a8ab392-f9ad-4d69-b6eb-6b57b64afeed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6405",
                "uid": "1b4dce22-3569-4b81-b08a-e70bbdb82e6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5311",
                "uid": "8f7120da-28dc-40f4-bc1b-16b1c6326b49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5366",
                "uid": "e42d2e00-63a8-41e5-b7de-f85b271a1312"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5973",
                "uid": "c66cf10c-1c30-4587-abbf-fced4d20e25c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:54Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1357",
                "uid": "b0f5bca6-e8cf-436b-885c-a208f5d94a88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:55Z",
                "name": "cluster-monitoring-operator-alert-customization",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1386",
                "uid": "991bdfbd-60b7-40a1-ad57-b9835dc5930e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-monitoring-operator-alert-customization"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "console-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "3789",
                "uid": "6f52624b-7621-493f-a4dd-8ef7d77e4a79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "dedicated-admins-hostedcluster-uwm",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5768",
                "uid": "6ce6e0e3-4189-4047-baad-076143151116"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-hostedcluster-uwm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:52Z",
                "name": "insights-operator-alertmanager",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1305",
                "uid": "d4e04d8a-1c00-4f67-85ce-61f912a7f851"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:47Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12537",
                "uid": "9ba7e9d0-e7e7-41c3-a5e2-c1558c89195d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:47Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s-config",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12545",
                "uid": "eb068dcd-4f42-441c-916b-d19f3510ca3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-config"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:05:17Z",
                "labels": {
                    "app.kubernetes.io/component": "segment-backup-installation",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/instance-namespace": "tssc-tas",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "segment-backup-nightly-metrics",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rhtas-segment-backup-job-tssc-tas",
                "namespace": "openshift-monitoring",
                "resourceVersion": "21764",
                "uid": "21fd7fee-73bd-448a-84bc-fabe7390cc34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-segment-backup-job-tssc-tas"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-segment-backup-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "2745",
                "uid": "35f4f722-85f1-41ae-bb33-214837717f38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-monitoring",
                "resourceVersion": "2742",
                "uid": "186fe6e0-a1d2-49b1-981b-2715d4166217"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "2724",
                "uid": "ba887d2e-4fd8-4caf-92ab-226c55923c2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-multus",
                "resourceVersion": "4985",
                "uid": "4422e87a-bbfc-4cf1-b065-0848bb011a49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5186",
                "uid": "7dc9cb0f-6920-4fc1-8264-aa3937de2977"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6018",
                "uid": "b4ee1ea7-5ff6-43ad-aea5-e7ecb0deb743"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5539",
                "uid": "474c998b-d712-4ce7-bf00-a96faa2b2f76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5414",
                "uid": "c354b7f7-6397-4019-b382-3cd13b0d200a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5575",
                "uid": "d8ea3ee8-4663-450b-b57a-ff2df066a69b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6161",
                "uid": "2f65719b-4a57-46b7-832e-881e80630a3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6483",
                "uid": "19a1ca1f-e2e3-4fe2-89ff-0c957059484b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-multus",
                "resourceVersion": "6357",
                "uid": "f229d815-5bea-4049-bbf2-d0d4c3511729"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5288",
                "uid": "33c6d41e-2bea-40e6-bed9-ddcac622271f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5333",
                "uid": "51338d9e-1580-46ba-a7d9-9fb0bc6fd968"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5864",
                "uid": "9278558f-a02c-48f4-9db5-c15535eab040"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:18Z",
                "name": "multus-whereabouts",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3494",
                "uid": "6ba413d2-b230-4843-b978-97c0ea87f3eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:22Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3573",
                "uid": "9db36dfd-c5d2-49c2-b1ae-c64f08d3b125"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:16Z",
                "name": "system:deployers",
                "namespace": "openshift-multus",
                "resourceVersion": "3409",
                "uid": "5846829b-308d-4a8c-8cb6-a27eec2a0023"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:16Z",
                "name": "system:image-builders",
                "namespace": "openshift-multus",
                "resourceVersion": "3411",
                "uid": "343707f7-cdd0-4f86-9139-8f79ec460917"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:16Z",
                "name": "system:image-pullers",
                "namespace": "openshift-multus",
                "resourceVersion": "3410",
                "uid": "9feeaa02-97ec-4bff-98d2-4088dbfef444"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:06Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6542",
                "uid": "38e341b7-ee94-41b4-bea2-185ddea9c863"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-cee-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6229",
                "uid": "f1873b37-41ba-4146-8fad-2514ea5cf3fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:11Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6582",
                "uid": "f4454fa3-f211-48c1-9d9e-01c0c5582821"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:34Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6802",
                "uid": "067b7bd5-0ec9-4d59-81ed-8dc8a1f116b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-csm-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6531",
                "uid": "0aab4fa8-7a21-4bac-9f74-e33ac13c7689"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6697",
                "uid": "4177d01b-63ab-46de-a484-a212a4d5213b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-lpsre-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6524",
                "uid": "beadfd7f-a1ec-4a0a-a856-0d69e38c087f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6637",
                "uid": "8996059d-36b4-4c9e-ac19-eecbaf163c1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:18Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6631",
                "uid": "a7cad043-287d-4445-ba5f-8f9b3789ae3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "backplane-mcs-tier-two-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6328",
                "uid": "e4d2620d-1825-4862-b879-10e37efa639d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6806",
                "uid": "ef3e157a-1b39-440b-9ef1-11524161bb5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:24Z",
                "name": "backplane-mobb-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6687",
                "uid": "68d14dbd-d18f-40ec-b6ef-a913313426b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6364",
                "uid": "ee4c282a-36b9-4414-869e-3f73dfe74743"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6468",
                "uid": "fa5b239c-ebd5-42f4-824e-b571a4c57b36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:30Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6738",
                "uid": "7aeb743a-9f05-40fa-972d-32320a8ed668"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6584",
                "uid": "16034b4d-6ebf-4e80-8455-aa36d1c70b50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6621",
                "uid": "a862cc18-61e8-4d3d-b336-d38df9bc0edb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:27Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6709",
                "uid": "423e5067-ca42-4c74-a5fa-7a827e996171"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:40Z",
                "name": "backplane-tam-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6825",
                "uid": "b47619c3-3205-4173-9745-3c3f4f49f2a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "system:deployers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6184",
                "uid": "d86b2467-65bc-4b5b-bda9-006a29b002ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6183",
                "uid": "dc2d3ebe-f3f3-4afb-9a6c-ff5060cdf819"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6182",
                "uid": "b4968bfe-60a9-4d59-a8c7-c7795c15c7a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "4913",
                "uid": "bc17756d-c347-4cc1-9c69-441fd75e9b5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5065",
                "uid": "e1050b77-841b-41da-9b53-8b5203b22ec0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6002",
                "uid": "671966a0-a936-4880-81ca-b77e7db4222e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5716",
                "uid": "eeeb7636-9e52-44a1-a973-e858efaa9026"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5374",
                "uid": "310b6f47-56cf-4683-9ee3-bc021a22de3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5566",
                "uid": "da90bd3b-60e5-48b6-916e-f736d09835d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6269",
                "uid": "d62d5591-9d32-41d5-b3db-63c8541e6027"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6486",
                "uid": "21c1f8d3-4603-4d98-b66f-fe1f22129d91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "6450",
                "uid": "151618a7-39c1-4c2d-9592-c3ad12178de4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5239",
                "uid": "0eae3e2c-1e7c-4424-895e-27a6a153f5eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5302",
                "uid": "5c26944a-6e35-4d92-a379-0aef0ebd2d2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5935",
                "uid": "f477da5e-bd84-47ed-b18d-a1eaa4a9cd7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:59Z",
                "name": "system:deployers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4490",
                "uid": "a6fd825e-9564-4ddb-8b27-aa28febdbc26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:59Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-console",
                "resourceVersion": "4488",
                "uid": "24ca1138-4340-42ad-9220-8f7e80e227a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:59Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4489",
                "uid": "7295ba40-5945-492a-b9c3-4b5edf537417"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4860",
                "uid": "0cf8ffff-32bf-4226-be9d-b620db9b931f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5101",
                "uid": "731e6d4e-8f95-4006-967f-7d7ad08a19b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:46Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6075",
                "uid": "3e96fccb-7cac-43d8-8297-ffb7e721ac26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5653",
                "uid": "cd7f451b-f52f-4a40-ab11-1b8221d5b585"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5458",
                "uid": "4973eeba-759f-4c58-a86a-78213a7cdd96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5560",
                "uid": "a46235a9-a144-4a7d-bfe3-6154fe440be8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6239",
                "uid": "e7bdeb80-4249-423a-a020-8ff50d919ac6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6353",
                "uid": "70425700-26d2-4bb3-bbdd-c7239fcbc740"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6371",
                "uid": "fc311c0a-6c85-4969-8cdb-d2c28f11c0ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5162",
                "uid": "00914a9a-f779-4fd2-9dc1-b90fb613468f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5400",
                "uid": "4a224b66-1d1a-4cb9-8fb1-226535444f5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:35Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5795",
                "uid": "974fca7e-dfc3-4b69-b44d-09809ad4d0c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:32Z",
                "name": "network-diagnostics",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3996",
                "uid": "b02e696e-6da3-4b67-b3bf-bd329577d809"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:33Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "4016",
                "uid": "bc0a509f-c474-428a-9bdc-4f01658b790b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:31Z",
                "name": "system:deployers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3984",
                "uid": "75c541ab-5c47-4d42-a9c6-87b8d53d99cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:31Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3987",
                "uid": "4637602a-2ec1-4a24-b57c-1c8240596d00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:31Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3983",
                "uid": "c1d397c0-976d-48b0-9b43-f87969241ead"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5041",
                "uid": "52f200e7-6d72-46dd-9cf9-027c4094a72a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5124",
                "uid": "e493f987-9abd-4be4-aa84-9cb9fa2d78fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5987",
                "uid": "15afc910-e90d-4dd6-ada1-a57cfce486d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5737",
                "uid": "735b58d2-dcd7-4b45-879e-a4db6d8e6676"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5462",
                "uid": "bc381d9f-8505-4506-a23b-23054ef6ae2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5568",
                "uid": "d1924588-a392-472c-a7a8-3e0443864ce4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6162",
                "uid": "8bc4cce7-853b-4a7e-bc9a-526a9698cab3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6520",
                "uid": "1b0e6714-f887-4ff1-aef7-d499541da03d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6471",
                "uid": "8d6a0c07-fbb1-43e1-a95a-4f4c0342b160"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5241",
                "uid": "9b5836da-b3a5-4936-9e6e-00221564fdb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5335",
                "uid": "3736b30c-04a3-4392-b834-6f8f7cf64ba6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5904",
                "uid": "681f4374-3178-4eb9-a03e-e47c66b709ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:35Z",
                "name": "network-node-identity-leases",
                "namespace": "openshift-network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "4047",
                "uid": "a75825bc-37ba-460a-b11a-7287bbc2af78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-node-identity-leases"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:34Z",
                "name": "system:deployers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4038",
                "uid": "a4ded1e0-9d6e-4ece-a76b-40692b3c0aa0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:34Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4037",
                "uid": "1cce6f8b-d1f3-4241-915c-7ce5d7a70a27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:34Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4036",
                "uid": "13288a4a-4477-4189-bf05-0249cd31f1fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4965",
                "uid": "f2b7a994-0bc1-45e9-b6bc-da2ad079cdd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5188",
                "uid": "abaee6aa-81dd-48c9-9d69-845f208349a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:43Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6028",
                "uid": "09b62923-94c6-47d3-b8bd-61c3c3c25fce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5658",
                "uid": "30d02666-349e-4479-b1be-d79286421101"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5365",
                "uid": "76179c6c-430b-47a3-9b52-ba9ffa73e4a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5506",
                "uid": "dbbbf707-3b2c-487f-a6d3-1ae79d7aa812"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6111",
                "uid": "66a73c66-2382-4cc5-aad7-3740db24e9db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6488",
                "uid": "c316e059-9855-49d7-a585-e8ec728a6508"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6420",
                "uid": "897c68a3-2b5b-459c-9b2b-f57926400c2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:11Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5221",
                "uid": "b4e15035-51ae-4253-99b1-0b7199279c7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5278",
                "uid": "a9e340b8-6fdf-4266-94f1-1b67ed2ded00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:36Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5832",
                "uid": "0ba7a467-93e2-4cd3-b081-63397e1ef183"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:52Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1302",
                "uid": "aef8ee53-e6f7-4f8a-ac5d-5e8b3aa12e65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "2746",
                "uid": "d9121cda-7438-4ca7-b17c-c0077ce188d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-operator",
                "resourceVersion": "2736",
                "uid": "72d474e5-1a04-412f-ae0a-b3aae4db4596"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "2740",
                "uid": "d5f913cd-d193-4671-bfa1-2fae1bf36353"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-node",
                "resourceVersion": "4989",
                "uid": "6f3e0a1b-63be-49f2-b7e2-3ba6ddd34401"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-node",
                "resourceVersion": "5127",
                "uid": "7f38561e-b759-4f68-a81f-45dd3f65a8ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-node",
                "resourceVersion": "6049",
                "uid": "4ab146a4-3368-4365-b12b-a5feab859c24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-node",
                "resourceVersion": "5665",
                "uid": "adef0351-5728-4a7d-9ca8-8a0cb43905a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:19Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-node",
                "resourceVersion": "5395",
                "uid": "75677570-5258-4534-95c1-01e49f24b2b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-node",
                "resourceVersion": "5424",
                "uid": "9ac9beb9-f21a-4128-aa60-69dfeed34dde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-node",
                "resourceVersion": "6122",
                "uid": "f394c097-f0dc-4f9f-8c96-2fac1aca927d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-node",
                "resourceVersion": "6382",
                "uid": "6f043aab-1324-499c-ac62-e4789e5611e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-node",
                "resourceVersion": "6473",
                "uid": "cf09d6cb-bffb-4682-883c-98cfa57e6be6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-node",
                "resourceVersion": "5205",
                "uid": "0cca3a5d-99af-4119-9c01-00445b75a0b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-node",
                "resourceVersion": "5255",
                "uid": "36e2131d-2766-47ba-877a-9d60ef9d864b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-node",
                "resourceVersion": "5868",
                "uid": "3f4b122a-e241-4182-a708-e0f3af66e9b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-node",
                "resourceVersion": "2737",
                "uid": "8f8b15d2-d6ef-4b3e-b462-c6bfaccca827"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-node",
                "resourceVersion": "2739",
                "uid": "d7999c1b-9eac-4a28-a2c5-945cf6d05e64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-node",
                "resourceVersion": "2747",
                "uid": "4cf532da-816e-4d8e-8787-aea94a768658"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:00Z",
                "name": "system:node-config-reader",
                "namespace": "openshift-node",
                "resourceVersion": "462",
                "uid": "ae9449d3-9c82-43c3-be00-92c3366d4e86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:node-config-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5035",
                "uid": "79400908-3e5c-465b-afe8-fa9640921993"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5198",
                "uid": "4cf2e9b5-21a8-45fb-98e3-140c4bb40b8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6108",
                "uid": "65022e52-8b88-4584-b170-1d494fa831b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:34Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5777",
                "uid": "93245cab-d63c-4bae-8233-68492aaae5e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5488",
                "uid": "9038a770-d438-42ff-a5c8-34e4e1f7d82f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5569",
                "uid": "331ff720-eec3-44a4-a23b-500538d0eabe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6272",
                "uid": "56b450c0-1731-4f92-8cee-4146dcd37069"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6399",
                "uid": "9f2bd552-0a0f-4a1f-9099-cefb2c10d728"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6391",
                "uid": "d6523770-d183-4df2-bcc8-7fa9dfe1519b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5279",
                "uid": "d64af60f-35de-4431-a681-c121a4376795"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5362",
                "uid": "9d51317a-219c-489e-acc9-705fa3dbcd6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6009",
                "uid": "c66b1245-fa28-4e56-8827-6ff2277af748"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "2748",
                "uid": "74b6f089-c246-4842-a922-b61d16ed34cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "2738",
                "uid": "71e6ee9a-a468-476f-a3cd-98351b59614e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "2743",
                "uid": "de02d3ca-c5fe-4a99-9a23-327f372abb07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5903",
                "uid": "27262855-5ceb-493a-9ed1-d7fe8406f3bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5908",
                "uid": "8f0f98e5-21be-4396-bf31-f755f49642a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:08Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6556",
                "uid": "4a981228-9c22-4554-9bef-191d981f1ac1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6560",
                "uid": "b0fd4a16-fc11-48ec-9808-9a23db1588d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5989",
                "uid": "ecf0331c-5ee2-4811-a2c6-66800dd11e8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6724",
                "uid": "25e841b9-93cc-44c3-bd0f-d5bd681819ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6654",
                "uid": "f1aaec55-b362-4236-890b-4b673e248cf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6662",
                "uid": "e24f294c-5315-490d-8040-c8681facfb04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6274",
                "uid": "590ead91-3115-414e-a3c8-48e9182027fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6443",
                "uid": "dda06c83-d0a3-48e2-9bb2-4c807d7bbfda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6497",
                "uid": "80857561-232e-4242-a240-ae0d87fc3568"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:14Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6605",
                "uid": "026354c8-c294-4489-8cd6-d5cc5f80f216"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:12Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6585",
                "uid": "1fdf2400-7792-46c6-90fc-da3ffef0e9f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:25Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6694",
                "uid": "5e958697-08ad-41a4-b4a8-4a0111411bb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6311",
                "uid": "dd40a1a9-0ca7-4d43-b73e-54bc169196d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:54Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6323",
                "uid": "cb77aff3-336a-4033-9342-44be67b1e5b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6291",
                "uid": "9f755469-0c92-413a-9b68-a73ca1dddc48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6295",
                "uid": "2d249476-174e-4c7b-b9bc-df75c6ab2b23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "openshift-operators-redhat-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5910",
                "uid": "ca7cd89e-cd21-4513-b091-ef18abaa2b48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "openshift-operators-redhat:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5915",
                "uid": "9e769013-b1b0-456e-a64e-d29f6a59d9ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "system:deployers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5900",
                "uid": "629ff2a4-b9bd-42b1-a40a-bb2deaa66525"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5901",
                "uid": "85b83aa8-fb99-4955-ae8c-b3b9509640fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:47:37Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5899",
                "uid": "522bd658-46e4-46ae-b645-891715a05623"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5047",
                "uid": "4c2af193-c1c6-4872-a76a-2c7ac664e1ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5154",
                "uid": "96fb1d63-159a-4475-a5c4-1f4de87ed1d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6112",
                "uid": "d34487d3-e08d-41d5-86ce-dd25ede7a65d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5567",
                "uid": "11d5e9aa-4345-497d-aca6-c971d7f5be9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5463",
                "uid": "d367ccdd-c8b6-419a-970d-31345b0726ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5449",
                "uid": "74cdd4b4-58a2-4901-8418-2eefe871ae4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:51Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6255",
                "uid": "3ad3cca4-e745-4052-88e4-a00d6405dcfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6457",
                "uid": "afcb9e8c-46bd-46d2-98e5-79a18103eda6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:02Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6484",
                "uid": "ec60c9df-8a0d-46d3-b04d-35e39fedbf04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5204",
                "uid": "e44d7251-5734-4968-ba9d-1a402b65ae73"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5397",
                "uid": "de750a47-4173-4912-bb0f-5fe99696dda3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5970",
                "uid": "a3665dd7-c5d3-4556-92c5-1a6d753b2022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6293",
                "uid": "0a1ed486-3291-4396-80cf-5bb3809279cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6318",
                "uid": "f02a118e-e335-4462-8414-ed29d8844248"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6288",
                "uid": "a4a6da65-9e62-4bd3-91cc-948d87f59e10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:53Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6292",
                "uid": "27f167fd-fd69-4a0e-af9a-eb480031926d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "dedicated-admins-openshift-operators",
                "namespace": "openshift-operators",
                "resourceVersion": "4977",
                "uid": "92b2fdcb-7247-4130-a62e-91b27b8bff40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-operators"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:42Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.20.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "31y2SoGUr82Fv9XqDhEJSJ5p5kYP2889VmYof2",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-9MX8QfYn0P9thqbwlrnG1JwC6XXvosHg6xMzZc",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "openshift-gitops-operator.v1.20.1",
                        "uid": "b6235217-2fe6-4b22-95c0-6296f1bf33d4"
                    }
                ],
                "resourceVersion": "16960",
                "uid": "c63316fb-b46b-4861-9c3a-970f8b91c0bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operato-9MX8QfYn0P9thqbwlrnG1JwC6XXvosHg6xMzZc"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:45Z",
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-controller-manager-service-cert",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "openshift-gitops-operator.v1.20.1",
                        "uid": "b6235217-2fe6-4b22-95c0-6296f1bf33d4"
                    }
                ],
                "resourceVersion": "17458",
                "uid": "edab0924-d6b2-494e-90f0-f8a42aff9bf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator-controller-manager-service-cert"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:36Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator-prometheus",
                "namespace": "openshift-operators",
                "resourceVersion": "16579",
                "uid": "3b9b7f8c-d829-4877-8c6c-fd8d4ac9f5b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator-prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:36Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator.v1.20.1",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-gitops-operator.v1.20.1",
                        "uid": "20e2a02c-1a81-4313-9aa0-7e3ea65988fe"
                    }
                ],
                "resourceVersion": "16566",
                "uid": "0b182a17-80d2-4af0-8c29-5edc85723efb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator.v1.20.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:33Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-prometheus-k8s-read-binding",
                "namespace": "openshift-operators",
                "resourceVersion": "16444",
                "uid": "9d202192-efed-4715-80f6-7b24036daa40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:27Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-rh.v1.21.1",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-pipelines-operator-rh.v1.21.1",
                        "uid": "67e40612-d549-4a4b-a6e4-803ab096446b"
                    }
                ],
                "resourceVersion": "16164",
                "uid": "a35b57be-8ccf-4493-bcf7-b1a62abc4e2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-rh.v1.21.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:45Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhdh-operator.v1.9.3",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhdh-operator.v1.9.3",
                        "uid": "7b8db17c-2762-4756-a5fc-8534b08a26f7"
                    }
                ],
                "resourceVersion": "17064",
                "uid": "e62d8621-0327-4f83-9368-938b446bf805"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhdh-operator.v1.9.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:49Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhdh-operator.v1.9.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "6Rjvo2Z9QeedDa2NdNjcAiHP0v6y6Q7yV1uvEa",
                    "operators.coreos.com/rhdh.openshift-operators": ""
                },
                "name": "rhdh-operator.v1.9.3-rhd-8DSjXahW9xiG1gZ5ND4A5s0zLrishtwqU7tiCN",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhdh-operator.v1.9.3",
                        "uid": "59aa5d28-f48d-4768-b3f3-80b523e418d1"
                    }
                ],
                "resourceVersion": "17440",
                "uid": "fbadfc9d-4f01-4277-9d23-4b1ecffc83bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhdh-operator.v1.9.3-rhd-8DSjXahW9xiG1gZ5ND4A5s0zLrishtwqU7tiCN"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:42Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.3",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtas-operator.v1.3.3",
                        "uid": "c52efc7b-86c6-42a1-b7d0-77342b619e58"
                    }
                ],
                "resourceVersion": "16913",
                "uid": "04feea80-ebbf-4fda-b8e1-2fab262417ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:45Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtas-operator.v1.3.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "9G792iSQXWwzUWZgReGQ9WUSeYqsIjvOU7RX34",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.3-rht-upHYtGeVuJ346395fnICIw1hq6AjqiEcjS5u9",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtas-operator.v1.3.3",
                        "uid": "03001213-5dc8-4618-98b6-b6c523d4a571"
                    }
                ],
                "resourceVersion": "17374",
                "uid": "2cb65f14-5d75-4775-920f-d65fa8ee48cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.3-rht-upHYtGeVuJ346395fnICIw1hq6AjqiEcjS5u9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-operators",
                "resourceVersion": "2760",
                "uid": "aff60327-0656-473d-b46b-f56751415792"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators",
                "resourceVersion": "2770",
                "uid": "b8844bce-5959-4baf-a7a2-5d3cb48f545f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators",
                "resourceVersion": "2744",
                "uid": "d86e7d44-132a-40e3-8e4a-bd8292296531"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:33Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "olm.managed": "true"
                },
                "name": "tekton-operator-info",
                "namespace": "openshift-operators",
                "resourceVersion": "16452",
                "uid": "098fb835-8bc9-44d4-a3f3-b272dfd5ac16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4984",
                "uid": "bff7a47d-0e4b-4280-a96d-27e053c97e78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5075",
                "uid": "64a95567-5fb6-40fc-a7cb-7e7a6bef05b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6063",
                "uid": "7caaf01e-b0f6-49d2-b978-e5ee9357541c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5750",
                "uid": "5d88be82-1ae5-4eb1-84ab-3cb45c5ed50d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5375",
                "uid": "09ba8738-0035-4c89-8435-7d0c84b02c78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:22Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5440",
                "uid": "09cd67bf-43dd-4466-b416-42f25de58c5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6275",
                "uid": "0092ceac-fbc4-4f35-98bf-df2be4209d95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6522",
                "uid": "25ed5338-4591-4029-8ee9-0664f872e9b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6409",
                "uid": "46da16a2-0f8f-4ca6-b854-22a569aaf5f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5232",
                "uid": "dd67758a-a16b-4a47-80c5-34d1dfaa1376"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5305",
                "uid": "b2262097-a170-4003-93a9-c67166c08883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:42Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6011",
                "uid": "89017372-6662-4ee0-a54c-45218cd977ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:27Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3847",
                "uid": "2fd234d4-a5b3-46eb-9e98-482bf37787c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:25Z",
                "name": "openshift-ovn-kubernetes-nodes-identity-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3791",
                "uid": "ecfb119e-f295-4a5d-87ee-5f12c79ff44b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:30Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ba505f9e-2f4d-4eca-8f48-df65b549aa4a"
                    }
                ],
                "resourceVersion": "3931",
                "uid": "108c9e1e-f93f-4515-afc7-53e6eaf38f36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "system:deployers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3683",
                "uid": "d8b0a60f-3062-49c0-b894-7a724bf671fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "system:image-builders",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3682",
                "uid": "b6626d78-ca5c-490b-be39-5a1b89ad8000"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:23Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3680",
                "uid": "312a6e1c-f39e-47b7-8a05-0e449bc948a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4991",
                "uid": "82e418bc-8e38-4d22-9878-a44e58730c01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5156",
                "uid": "d0b75771-ed89-4b1f-8ad1-2c6153897ade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6050",
                "uid": "a7bf35ed-aeb8-4307-a054-8afc6b9aa0d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5620",
                "uid": "5bafff64-94ca-4622-b0ac-009ea89b7584"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-lpsre-package-operator-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5360",
                "uid": "82a3e850-b4fc-4d2d-ad95-cb5cef50f54e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5417",
                "uid": "e5116a12-740c-4d3b-b14b-b67afe7cf55d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:26Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5521",
                "uid": "9b75dede-3486-4a12-a92e-5aaa0fcf176b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6149",
                "uid": "1a3ce271-80f0-43b7-a989-8b02af3efcb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:57Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6385",
                "uid": "8216bf3c-e759-4660-8521-b2dd02751637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:56Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6360",
                "uid": "77584081-06de-4905-bf35-fea00da9b4fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:12Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5233",
                "uid": "76eebad7-0cc2-4717-8717-3b4940e7ec9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5297",
                "uid": "f3914926-098a-46a0-ad74-e1772ccea70e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:40Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5976",
                "uid": "2414662f-69bb-4389-8f69-cc1167f7f314"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:04Z",
                "name": "system:deployers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4570",
                "uid": "d8f238ce-32e7-45a7-86ed-120073f52172"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:04Z",
                "name": "system:image-builders",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4571",
                "uid": "c1e88bef-3847-4e54-96c6-34850370224a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:46:04Z",
                "name": "system:image-pullers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4561",
                "uid": "28b60d60-298b-4dfa-b3ad-1f2f295665e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "22751",
                "uid": "eaad6094-02ab-441f-9350-61ba7a798dab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:42Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23506",
                "uid": "5566bc8b-fb29-4fb5-a924-87dfe09547cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:23Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23068",
                "uid": "61ade04b-e6c1-4ec5-aa70-ca91541fcbc4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23091",
                "uid": "559f108c-14bf-46c9-a0e4-908cf0f52b93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:38Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23421",
                "uid": "18fe3ca7-fb4a-4770-aa75-d23e7ad4f670"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:33Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23352",
                "uid": "4af5b9c3-832a-4f05-86ae-79f58c1f3a4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:30Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23233",
                "uid": "98760496-31a0-4ffc-8d56-47803ecfd86f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:32Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23339",
                "uid": "e86828af-dc2b-4be0-adc2-667a176b81d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "22717",
                "uid": "b4035209-f253-4b90-9b0b-ac496d897e39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:39Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23433",
                "uid": "7a72b63a-9322-494f-84c2-2b957c20baa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:31Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23309",
                "uid": "05e733d5-5cf9-40b8-baf4-3147912cd0a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:44Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23550",
                "uid": "eed951b1-8df5-4646-89e5-4ab8632147d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "22dbecf9a7f414b9b3524e1a5f6c4cd0535653c671a9d5856ab7f06f3883c34d",
                    "operator.tekton.dev/preserve-rb-subject-namespace": "true"
                },
                "creationTimestamp": "2026-04-21T11:07:01Z",
                "name": "openshift-pipelines-prometheus-k8s-read-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-post-bnx6m",
                        "uid": "0c109df2-2de6-4e54-9f35-b426a6f9f901"
                    }
                ],
                "resourceVersion": "23897",
                "uid": "edf3a508-af3d-44c9-a050-86bd4614c72e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9cb2b64c5d9ed502d9dda91d85a2738a9dafebd96c79cb5f15fa146f7e1fc323"
                },
                "creationTimestamp": "2026-04-21T11:08:37Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-zjmpf",
                        "uid": "bd79dd71-984f-47e6-acb2-f1c94f3b8aae"
                    }
                ],
                "resourceVersion": "26237",
                "uid": "1ffadde3-d419-4307-9302-683f91e00932"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0760a9e51ccee67d2b68b7afe6d5be5758ac13e817d80ba417cabdb1f6e05b5c"
                },
                "creationTimestamp": "2026-04-21T11:08:37Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-zjmpf",
                        "uid": "bd79dd71-984f-47e6-acb2-f1c94f3b8aae"
                    }
                ],
                "resourceVersion": "26234",
                "uid": "9c785b0b-98fe-4c44-bfcb-a07b18a17eb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7500928a424fa772c0327100f08ad618147fee5a9f28d49d84f41c2cd4a09d01"
                },
                "creationTimestamp": "2026-04-21T11:08:37Z",
                "name": "pipelines-as-code-monitoring",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-zjmpf",
                        "uid": "bd79dd71-984f-47e6-acb2-f1c94f3b8aae"
                    }
                ],
                "resourceVersion": "26244",
                "uid": "7c345983-a3b9-4521-80ef-d25e892c843b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3ce9e0eaced3738d637e6893ae697cec97af4c8e5cef0df49cfd8f0ced45d7ad"
                },
                "creationTimestamp": "2026-04-21T11:08:37Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-zjmpf",
                        "uid": "bd79dd71-984f-47e6-acb2-f1c94f3b8aae"
                    }
                ],
                "resourceVersion": "26242",
                "uid": "0b373989-e843-4ef4-9de3-f50435ff9fb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f9f1764dc78ec3f4f45d02026860ee4835cb3c4f0897619f90ccf9dd182e87bb"
                },
                "creationTimestamp": "2026-04-21T11:08:37Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-zjmpf",
                        "uid": "bd79dd71-984f-47e6-acb2-f1c94f3b8aae"
                    }
                ],
                "resourceVersion": "26243",
                "uid": "088dcb44-fef3-4a6d-a6a4-47ded127cb24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:06:16Z",
                "name": "system:deployers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "22703",
                "uid": "77d1dd4b-a880-4c53-929d-3df5e3ef34ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:06:16Z",
                "name": "system:image-builders",
                "namespace": "openshift-pipelines",
                "resourceVersion": "22702",
                "uid": "b2818edb-bf30-4ef4-857f-f8bf4e47955b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:06:16Z",
                "name": "system:image-pullers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "22701",
                "uid": "557b6642-bb5e-4384-ad81-11a778bfe2b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "4a8cd6231dd5bfce0b9fd422405e889fc12d0e6181c789b8aa4e5598cf72470e"
                },
                "creationTimestamp": "2026-04-21T11:07:32Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-72lzj",
                        "uid": "dfbb7d3b-a89e-4087-8423-84282b8ba7f5"
                    }
                ],
                "resourceVersion": "24650",
                "uid": "c5134442-a6e5-4557-a8af-030471d1af7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c88cd22db277887cf4559e9bb30a90fa49751d6c9274769cc1f94023351d72c2"
                },
                "creationTimestamp": "2026-04-21T11:07:32Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-72lzj",
                        "uid": "dfbb7d3b-a89e-4087-8423-84282b8ba7f5"
                    }
                ],
                "resourceVersion": "24653",
                "uid": "efecac4c-09cd-48e6-9c78-9784896ec911"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e0b12971fad17ecb9ab0f3a0d7d096657ea5e532c29181d03896ad0454e5bf06"
                },
                "creationTimestamp": "2026-04-21T11:08:17Z",
                "name": "tekton-default-openshift-pipelines-view",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-zb9p5",
                        "uid": "58d11163-c438-4d9e-ad40-3232f27293d8"
                    }
                ],
                "resourceVersion": "25878",
                "uid": "b3c43a68-3170-48d7-bfb2-65c6f3b7a8a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-default-openshift-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"59b6b491b6ac243b0ba0fc1a7077d57898a43789923a6faf113b94b1f9b94de0\"},\"name\":\"tekton-ecosystem-stepaction-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolverstepactions-1.21-7dsmq\",\"uid\":\"833a3bb6-1570-4cef-8bf9-e06c96dcaa9b\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-stepaction-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "59b6b491b6ac243b0ba0fc1a7077d57898a43789923a6faf113b94b1f9b94de0"
                },
                "creationTimestamp": "2026-04-21T11:08:14Z",
                "name": "tekton-ecosystem-stepaction-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolverstepactions-1.21-7dsmq",
                        "uid": "833a3bb6-1570-4cef-8bf9-e06c96dcaa9b"
                    }
                ],
                "resourceVersion": "25938",
                "uid": "b27c02fa-7681-48e8-875c-394c810a12fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-stepaction-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"63e151a0b47f821c5e9f9446a5f12566e619160499b5cb99c84f1854694d7dc6\"},\"name\":\"tekton-ecosystem-task-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolvertasks-1.21-5grcr\",\"uid\":\"771c6ec5-74b7-42c2-ab44-93c3f9382a18\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-task-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "63e151a0b47f821c5e9f9446a5f12566e619160499b5cb99c84f1854694d7dc6"
                },
                "creationTimestamp": "2026-04-21T11:08:14Z",
                "name": "tekton-ecosystem-task-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolvertasks-1.21-5grcr",
                        "uid": "771c6ec5-74b7-42c2-ab44-93c3f9382a18"
                    }
                ],
                "resourceVersion": "25939",
                "uid": "665e68ed-0129-489a-a5e3-c89b0f64af85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-task-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e3b921679dde0e7596b92aa0507cb3e7610252c63f3685856300e600a316dd1f"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23151",
                "uid": "4917d267-42ea-4da3-8c4e-c942c8014e1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "08e57e660c435deaae09d00a6e8c0ec1d79e7a1f51fe000a56ad17c30074ea7f"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23154",
                "uid": "f1b1fc60-2531-4d93-91fb-4961edb4dd9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "51afb30afe646b047be5c3eaae208b0cd475b46e34d00aa82a991c43e36f5e97"
                },
                "creationTimestamp": "2026-04-21T11:06:26Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23143",
                "uid": "8127eb90-1dac-4490-a1be-71f5e5063829"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6189f493e6aac0972996897bfaa681e7a2516919d44bdb234b3102b19b105818"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23146",
                "uid": "049deeea-6d43-48ad-bb66-3f1d8dd813a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1f018d3a4a67414bd80b2f7f16dd2c7140541cc1ce5ff924fb9a0dc8171d9d77"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23150",
                "uid": "bcbdd9ea-10ef-4a91-a5e0-06b3c90e24ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "ff51b85588f2dab15a0c38687173bc913113bbd7d771f833ae46feed1d351f9f"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23149",
                "uid": "4d203d4c-debc-4116-8171-70ebc83ff906"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6011f4f3f8ef9c90fd92607c18db14de94790537438e14dcace5a31a0b1074b3"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23152",
                "uid": "f3e480d3-7aca-4960-aef2-27f4c7dcfafb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7d743d83fcb9be72cd4f723062dc9f00fcce260d1cb0b6257ab1e819737e3828"
                },
                "creationTimestamp": "2026-04-21T11:06:26Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23145",
                "uid": "cf7f70f5-e649-490d-96d5-790dd51e9b7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1f93ba380f171c99bb6a5ab7dd641855403fedf171e0ca35353ca9e12b6689fb"
                },
                "creationTimestamp": "2026-04-21T11:06:27Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-zmsf2",
                        "uid": "e36bd569-9dda-4e25-a47d-fded425ffce5"
                    }
                ],
                "resourceVersion": "23147",
                "uid": "d236d2e5-ffab-452b-ad4d-ce216fe300ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2c3e8019b1dd5f0a2f8948c2bbb67b20044fa4ad90bc935306c51b7ad2611c17"
                },
                "creationTimestamp": "2026-04-21T11:07:40Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.17.2"
                },
                "name": "tekton-results-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-lrflh",
                        "uid": "9fe872ea-a919-4835-ba62-40dfad7a4b9a"
                    }
                ],
                "resourceVersion": "24937",
                "uid": "2ac76032-be20-4486-b51b-f66363f23bba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "08a48e77dbf876bf188ee386b295d7a191667590fb922ad0098aafc473c83ebb"
                },
                "creationTimestamp": "2026-04-21T11:08:11Z",
                "name": "tekton-results-route-view-auth",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-post-k5t9t",
                        "uid": "090e9b40-d01b-4b37-98b0-9198f921e7b1"
                    }
                ],
                "resourceVersion": "25618",
                "uid": "aaa5035c-1ad7-4cfd-9edd-953b6a9068c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-route-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a0775301fc143a30b0aa37073067693337ea7ead2548d8c54911ca75cec5a71d"
                },
                "creationTimestamp": "2026-04-21T11:07:05Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-nj78k",
                        "uid": "e62fb745-660e-4a07-89b7-4fddf4b00d38"
                    }
                ],
                "resourceVersion": "24055",
                "uid": "186d9002-5c6f-412e-b77b-c356160cef12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "65d50f3988c01c7b79624244a682ae3bed68aeba6fd4d7ad2573dd81eab7a274"
                },
                "creationTimestamp": "2026-04-21T11:07:05Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-nj78k",
                        "uid": "e62fb745-660e-4a07-89b7-4fddf4b00d38"
                    }
                ],
                "resourceVersion": "24058",
                "uid": "8af7aced-9d88-49a3-a893-e3ef6473bc23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7011694be1ecca48cbff36323e5b22b3bc75a73ffc8697cbc5ef78f6ce104843"
                },
                "creationTimestamp": "2026-04-21T11:07:05Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-nj78k",
                        "uid": "e62fb745-660e-4a07-89b7-4fddf4b00d38"
                    }
                ],
                "resourceVersion": "24053",
                "uid": "358b8a61-b319-4458-897a-53f6fc5661c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5063",
                "uid": "fa195fad-8ef2-4bca-9b63-ecd7b8291c68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5141",
                "uid": "8f1cd9eb-8118-4cc1-a228-28067cc80ed1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:45Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6064",
                "uid": "eca35e5e-3991-4081-8719-d243032e2452"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5752",
                "uid": "68f43c26-d463-4345-8881-a53f21db5b36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5465",
                "uid": "b4bc80b5-6968-45ae-be1f-f28c3277d036"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5531",
                "uid": "e9544a75-61c1-4e2a-9f7d-89aeae88991c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:52Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6263",
                "uid": "3b089fb2-edd5-4800-be14-f42edeb82b12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:58Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6401",
                "uid": "dbace67d-f4c9-45ca-ac81-32a3bb2e2ea6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:01Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6459",
                "uid": "7738096a-680a-4650-931a-676df96a8465"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:08Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5159",
                "uid": "730ae680-42bf-4132-9a69-45f153e50961"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5405",
                "uid": "916642e2-8cea-49e2-b385-f195accd77d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5909",
                "uid": "d66c3c67-c62e-4580-a5fd-23237607eb21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:45:00Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "openshift-route-controllers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "1669",
                "uid": "a732cba1-9483-4a3a-9e0a-e3aa8ceb147d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-route-controllers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "2777",
                "uid": "ec215a5c-7c5b-420a-9acd-6f46425f8a23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "2778",
                "uid": "0fa91ebb-8673-487a-9e65-6fddca1759db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "2761",
                "uid": "f463efb5-d442-4d25-b483-e1de6e2d4a14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4865",
                "uid": "38b8bb67-eb01-41d7-8081-d47c295bce5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5058",
                "uid": "a5de1ec8-5d18-4afa-b8cf-6a5000da81ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5991",
                "uid": "66141e6a-8752-4410-9ca8-67cdb2bc2d0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5546",
                "uid": "7a51cd87-5c00-440a-b0dd-e49a3a4ebf35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5407",
                "uid": "45ac1e94-5eb0-43e9-a3ec-6a0e60b90f0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:29Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5577",
                "uid": "f07c541f-5562-440c-b980-2f87e873878d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6043",
                "uid": "6efb2f49-7406-4e83-bef0-cef82ae56131"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6504",
                "uid": "bafa5e99-a945-402c-81a8-519ca65825e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6344",
                "uid": "6258ceb0-c61a-4766-bf8a-3d94f5c62c31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:13Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5257",
                "uid": "adae1f63-ec69-497f-af51-18b17335ad5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5308",
                "uid": "a0cce2e8-acb6-4635-b46a-fafab544f028"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:41Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5986",
                "uid": "db9149ef-8b07-4260-a643-d1c1841608b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:42Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "928",
                "uid": "c3acd250-7307-4b58-b5b8-ddaba3d6c814"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "2775",
                "uid": "5eeac8ea-22df-4760-9098-aea2e3196ba1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "2774",
                "uid": "8c22d074-7469-4eac-a83b-553d46cb74a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "2772",
                "uid": "69bded11-b2d2-46e5-a0f8-01d484f485fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:41Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9608",
                "uid": "9e9f72c0-682c-4995-ba90-8c4fbcfaa797"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:52Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9762",
                "uid": "bedda297-bce0-47a9-a124-7f122af96b3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:59Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10471",
                "uid": "563970da-7156-4cc4-b7e8-4a7a12f95929"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:57Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10239",
                "uid": "ceee32d4-856a-4221-a431-8f4ee16009f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:46Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9721",
                "uid": "4098203a-60e2-4ef5-96ca-4cad35abb26c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10141",
                "uid": "8fe76fc3-9325-4e25-acd0-d9b0012cf246"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9597",
                "uid": "56113ea5-da0d-4aaf-8bf4-c662e0b73a67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:01Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "10546",
                "uid": "e59b5a5c-b3d9-4645-bf17-3856a1880d3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:31Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9304",
                "uid": "6d3d40d3-12cd-486c-81dd-afb498be8b60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9644",
                "uid": "e13df80b-5309-4099-8164-71f06ab2c2e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:32Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9346",
                "uid": "3bfe20ea-50d1-411a-8be5-5d03e0ca2add"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:48Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9734",
                "uid": "88f6c0d5-b8b8-4341-a8de-6e5e7fd7b621"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:54:29Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9230",
                "uid": "fbd0d6cf-5252-471b-b769-d4f4f10e5403"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:54:29Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9231",
                "uid": "4358f37f-7f7d-4e88-a187-8e4572737e16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:54:29Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9229",
                "uid": "ea254acf-621f-4152-9999-11b690fceaf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:54:28Z",
                "name": "system:openshift:controller:service-ca",
                "namespace": "openshift-service-ca",
                "resourceVersion": "9227",
                "uid": "cb44c455-4a92-401a-98cf-34a28b98f6d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:04Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5050",
                "uid": "6210fcd6-775c-423c-b506-e628f56dd8f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5202",
                "uid": "4da20177-014f-4cb8-ab64-4a9cefaa665d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:47Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6101",
                "uid": "f3c2ae3f-7887-431e-8d6c-7a0739147e6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5537",
                "uid": "9780e724-9812-4660-a308-e735627dc183"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5428",
                "uid": "adafddd7-cb68-454e-9b85-7b75f060845d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:23Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5460",
                "uid": "d18124f3-6281-4336-a1ab-8db0ac825261"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6124",
                "uid": "75c22396-cd79-4574-860c-54cac43b2597"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6342",
                "uid": "8b60b4e3-de3c-4fc5-be19-9bf132f42840"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:04Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6511",
                "uid": "84f45983-8c18-49a5-b764-4ccda6a0bcba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:15Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5307",
                "uid": "13ac3288-db35-420d-806a-9367e30c325d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:18Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5363",
                "uid": "dd92f9d3-2323-4114-a90d-0ef5604c7021"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:39Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5954",
                "uid": "ae73464a-a546-4a9a-91e5-07c03e5a182f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:54Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-user-workload-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1375",
                "uid": "329f1abb-fd43-41a4-b7ef-e56e971d426b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "dedicated-admins-uwm-config-create",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4924",
                "uid": "1e0b7e1d-e3a8-417b-b0c0-ae543d44a3df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-create-cm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:46:59Z",
                "name": "dedicated-admins-uwm-config-edit",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4921",
                "uid": "72bbd87b-2e0b-41cd-80f1-408ff9d4bd3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "user-workload-monitoring-config-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "dedicated-admins-uwm-managed-am-secret",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4927",
                "uid": "059084c4-9f7a-4311-bb92-c6c32e81ad78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-manage-am-secret"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:55:47Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "12540",
                "uid": "0219c617-52b7-407b-bb24-a61d71c6141d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:deployers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "2771",
                "uid": "3a8b637e-24cc-409a-abb1-ac372a884f9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-builders",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "2776",
                "uid": "d12fd536-e986-44fb-8e9b-2e783d1a4916"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:07Z",
                "name": "system:image-pullers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "2773",
                "uid": "baf89f24-4a52-4fdd-a43a-b66f29300182"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift",
                "resourceVersion": "4973",
                "uid": "38eb98d0-906e-49c4-a066-198eca2206a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift",
                "resourceVersion": "5046",
                "uid": "be6d49d4-1840-4af3-8c5d-5b1dbbe8a27a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:44Z",
                "name": "backplane-csm-0",
                "namespace": "openshift",
                "resourceVersion": "6054",
                "uid": "f883847a-cc8b-4ae0-b6cd-da804894ca60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:33Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift",
                "resourceVersion": "5754",
                "uid": "d32fd871-5569-4a43-b2f3-eb140106e259"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift",
                "resourceVersion": "5499",
                "uid": "3e14f586-7d6e-4fd4-a7d3-e11585369712"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift",
                "resourceVersion": "5426",
                "uid": "0a8f9f14-9acc-4829-a984-a8de5a946bcd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift",
                "resourceVersion": "6192",
                "uid": "a8f7ca87-1283-41a5-907d-7fadc6baec68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:59Z",
                "name": "backplane-srep-0",
                "namespace": "openshift",
                "resourceVersion": "6417",
                "uid": "811f627c-b64f-4866-9539-6c1c768473cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:48:00Z",
                "name": "backplane-srep-1",
                "namespace": "openshift",
                "resourceVersion": "6445",
                "uid": "4729d1bd-c845-4d19-8876-10735233b65b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:10Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift",
                "resourceVersion": "5209",
                "uid": "6f5ad4c7-10f0-4bfd-b7aa-d22bcf142804"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:16Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift",
                "resourceVersion": "5328",
                "uid": "05efa3c3-99c4-46d9-8465-6e450cf47ae8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T10:47:38Z",
                "name": "backplane-tam-0",
                "namespace": "openshift",
                "resourceVersion": "5911",
                "uid": "cbd68bf2-5d21-46a4-a025-8c9e2949324b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:56Z",
                "name": "cluster-samples-operator-openshift-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1467",
                "uid": "175f2add-af26-4d2c-8263-117ebbd80f60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "OperatorLifecycleManager",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:56Z",
                "name": "copied-csv-viewers",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "1ad9089d-17b2-433d-b01d-2cb1a71fcced"
                    }
                ],
                "resourceVersion": "1416",
                "uid": "11fa9cf3-4549-4b8e-83f2-0ee1b2362f04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "copied-csv-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "openshift-pipelines-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22754",
                "uid": "5a298f04-3c42-41b6-84ce-481143d01998"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "54dd08b4460b652d95c960316a51f20a40399938279c19e3d144e55ce2279357"
                },
                "creationTimestamp": "2026-04-21T11:08:55Z",
                "labels": {
                    "app.kubernetes.io/part-of": "pipelines-as-code"
                },
                "name": "pipelines-as-code-templates",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-post-n8wlg",
                        "uid": "94991046-6b1f-401c-a179-f37a9b6bfa36"
                    }
                ],
                "resourceVersion": "26869",
                "uid": "e687c32c-f45d-4dce-8677-a18a9a0daff7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-templates"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:17Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22749",
                "uid": "06105eb9-31e6-4ea4-a115-2c67bf8041d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-21T10:44:00Z",
                "name": "shared-resource-viewers",
                "namespace": "openshift",
                "resourceVersion": "463",
                "uid": "64e20ac5-45de-4ab6-b6c3-f1c7ad548a57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "shared-resource-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:deployers",
                "namespace": "openshift",
                "resourceVersion": "2070",
                "uid": "65f1c202-94cd-4d33-8fe3-0a049e607122"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-builders",
                "namespace": "openshift",
                "resourceVersion": "2015",
                "uid": "1ce607ce-8358-4d96-b2b7-a1eff99aaa38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T10:45:05Z",
                "name": "system:image-pullers",
                "namespace": "openshift",
                "resourceVersion": "2018",
                "uid": "04d35ef7-839e-4410-b9c4-376875ce54e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "dfed168ae65dc2ab43baf0e8ffc4a13cba1ed5c36bb33e0b70dcfdcaf127cf92",
                    "operator.tekton.dev/preserve-namespace": "true"
                },
                "creationTimestamp": "2026-04-21T11:08:17Z",
                "name": "tekton-default-pipelines-view",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-zb9p5",
                        "uid": "58d11163-c438-4d9e-ad40-3232f27293d8"
                    }
                ],
                "resourceVersion": "25875",
                "uid": "075ae2d8-e478-430a-bead-92713784060d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-default-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "rhbk-operator",
                "resourceVersion": "15372",
                "uid": "95770058-e9f8-42bd-bd49-7334ca57f4df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "15412",
                "uid": "88b990bb-7728-401f-aa82-58b773f2a60a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "15645",
                "uid": "699218ff-181f-4d69-ab88-435a361c304d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "15437",
                "uid": "a8865b55-59a8-4d3f-9f23-304158a5dc7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "15633",
                "uid": "e2aeb5ec-1dd2-4e5c-8995-d3800d0ae1de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "15411",
                "uid": "d5481b87-db3c-4ba9-9486-0bdd06cabd8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22762",
                "uid": "5f145eb3-ea6f-4aed-a25f-ef8f5e26a36a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22760",
                "uid": "81f3b574-194a-4318-b0e9-828775689ec1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:19Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "rhbk-operator",
                    "olm.permissions.hash": "4Z6mzHw3Gux72vIWxroUVRIpSW5IOUFnONBDgt",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.1",
                        "uid": "57923861-b2b8-49bb-a0ba-db9aa65963f5"
                    }
                ],
                "resourceVersion": "16383",
                "uid": "2a14afdd-60c9-41aa-b88b-4fac96d97dee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:17Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhbk-operator.v26.4.11-opr.1",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhbk-operator.v26.4.11-opr.1",
                        "uid": "04c95ccd-7126-4116-b1c6-fccc1d0678ea"
                    }
                ],
                "resourceVersion": "15867",
                "uid": "c168c683-1434-4efb-8a5d-d4092bf88385"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-opr.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "rhbk-operator",
                "resourceVersion": "15420",
                "uid": "4e545d07-d36b-433e-9471-204cbd38f0e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "rhbk-operator",
                "resourceVersion": "15421",
                "uid": "460b2e18-36ef-45f6-8b1d-d94e7c124fff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "rhbk-operator",
                "resourceVersion": "15416",
                "uid": "77d4a761-8623-48a3-b9bf-e42a093c9b05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15264",
                "uid": "fb7ae36a-6b87-4448-976f-1a0e969695f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15427",
                "uid": "c42d4172-4874-4e4c-be85-b34e659c876b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15369",
                "uid": "38b56d76-b3d1-4bc0-90f7-f7b7fa92659e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15492",
                "uid": "6df79ea7-e9b9-4d45-bce8-8d26505ea7df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admins-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15370",
                "uid": "56a50384-4e1c-490e-a35f-4f29b7376c25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15432",
                "uid": "fcd41a70-52be-46e1-ae62-5f8c86de98d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22773",
                "uid": "5593dd46-b7ae-49cf-92db-5c9d045523ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22768",
                "uid": "495abf96-cc98-4c9b-ba84-32b9f5793e2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15395",
                "uid": "8dbe8b09-2ce5-482c-a34c-83e8944a54e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15398",
                "uid": "d5fd43cd-140e-464a-ba62-9dab9fe08515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "15392",
                "uid": "752297ee-2b4a-45e9-b778-8bf5866e8e82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19332",
                "uid": "bc7550a6-ea10-4ae1-ae73-934c1e988e10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:22Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19589",
                "uid": "3cac8838-6012-4efc-a1a8-57ecb41de4b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:21Z",
                "name": "dedicated-admins-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19534",
                "uid": "89963969-d52a-49cc-991a-61f109b2ca22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:21Z",
                "name": "dedicated-admins-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19424",
                "uid": "0037b763-8b5e-44cd-b406-66b16da2ca69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:22Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "19604",
                "uid": "b9d195d2-caae-4a3e-949f-c0d3f8d8c81a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "openshift-pipelines-edit",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22780",
                "uid": "aa9f248a-cb26-450f-9dcd-2a02121b8ccc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22778",
                "uid": "9a69e35b-cfe4-4450-8cd6-867b22050919"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:02:05Z",
                "name": "system:deployers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18633",
                "uid": "8db14356-a4b5-4e7b-9a27-4da69ba23d05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:02:05Z",
                "name": "system:image-builders",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18632",
                "uid": "12875ff8-0d30-4c87-b689-a6e4e09a97be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:02:05Z",
                "name": "system:image-pullers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "18625",
                "uid": "3bc7d733-3245-49d6-a330-f1d785188bef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26559",
                "uid": "9aae1287-cbd9-4fc3-9344-621f83c09e34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26675",
                "uid": "49f83fb7-67d3-4bf2-b33b-eea0a9ee6c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26733",
                "uid": "0e6e6771-786f-44ff-b499-23cb48301830"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26748",
                "uid": "e2cfe0d3-874e-4634-a629-d3e7e0580031"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26681",
                "uid": "60ad7e59-6f05-4e08-b5d8-ddd63b9c7324"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26715",
                "uid": "3e1f5430-3a75-4f04-ac9e-51c13d2fc00e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26707",
                "uid": "35a9d03d-b3f0-4ccc-a5e3-629d0dc0ec1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:deployers",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26636",
                "uid": "cc8f59d5-c34c-40c6-bb48-b489352a1977"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26657",
                "uid": "4ceccfcf-5b03-4849-bf89-2bc91dcae113"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26656",
                "uid": "842754b1-fd7c-49b9-bfa4-932b29569746"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26608",
                "uid": "949ab0f8-0552-4549-bf4d-51919fc1e7f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-ci",
                "resourceVersion": "26651",
                "uid": "1c4549e5-83b6-4190-8a3b-c380a94da901"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-development",
                "resourceVersion": "26614",
                "uid": "1a764b76-5514-4d4e-99cd-fc688a9e586b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-development",
                "resourceVersion": "26682",
                "uid": "07ec4f9d-eaeb-4cf2-84fb-55a6c80d94fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-development",
                "resourceVersion": "26747",
                "uid": "c713c822-659a-4cab-8fd9-390a190e4118"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-development",
                "resourceVersion": "26794",
                "uid": "344a3481-56ab-40f7-8614-982bce8ffef0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-development",
                "resourceVersion": "26716",
                "uid": "2475e6ab-2b78-48e2-91d9-658f76283883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-development",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26739",
                "uid": "a07bd03a-8109-445f-8906-c2b6f22fe0d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-development",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26728",
                "uid": "de28f80d-effa-493e-b984-ec77edde5978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:deployers",
                "namespace": "tssc-app-development",
                "resourceVersion": "26661",
                "uid": "77446745-5c93-4da9-9942-67793f53cb93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-development",
                "resourceVersion": "26662",
                "uid": "f7275e66-4a30-4e5c-b1b2-14013b5884d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-development",
                "resourceVersion": "26658",
                "uid": "b7917f7e-3fbb-4cec-9d14-d6198793b599"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-development",
                "resourceVersion": "26708",
                "uid": "713596ba-e902-4ad6-bee3-c1fbeb0c7a2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-development",
                "resourceVersion": "26729",
                "uid": "48fc7de6-5018-4fbd-9dac-79b1e86a8493"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:58Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26946",
                "uid": "34308792-1906-4cbb-8194-ab1be6cc0515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26635",
                "uid": "7bf94017-76d6-44dd-b862-cfe9214cef83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26753",
                "uid": "69f1b5a7-639e-492b-8095-ae9faecb78d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26772",
                "uid": "397c2614-c8af-49dc-b486-72549f8e3331"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26691",
                "uid": "245290e6-a605-4471-bbcf-b5dea2e2c0f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-prod",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26754",
                "uid": "5772b8cd-0c6c-4827-8d9a-90b872a40048"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-prod",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26749",
                "uid": "028d7469-096f-4166-9928-6a817d3bb639"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:deployers",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26638",
                "uid": "7827a008-310f-46ac-8894-1f801f618025"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26663",
                "uid": "1a65d004-8506-4373-bc6e-2e4e00f15526"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26660",
                "uid": "2b4cc463-e546-467c-a731-9b07f05bf884"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26696",
                "uid": "d1bc3f5f-729a-47ff-a663-db185313d66a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-prod",
                "resourceVersion": "26714",
                "uid": "73e9c73b-c739-4ff3-86ea-ab086207510c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26637",
                "uid": "46978c7d-2062-4168-aafa-7b8d98d59e8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26659",
                "uid": "56ab5269-45a2-403c-9a9a-b136b7007eb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26762",
                "uid": "fde4b0de-336e-410e-b304-e48a00d9ed24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26780",
                "uid": "f00de7d3-4a60-41b7-ac41-f124d5b55464"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26705",
                "uid": "b39e4ce8-82d6-4cdc-aa27-c144d0f103f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-stage",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26771",
                "uid": "a178da1f-fcdc-443e-8642-8efadbf9c4fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:08:53Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-stage",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "26763",
                "uid": "405d8ea3-f184-4c7e-8785-d29065489d4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:deployers",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26653",
                "uid": "1919c371-169a-4010-ace9-6039535d0dec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26654",
                "uid": "bd794656-3420-4405-bafb-38775c64d273"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26655",
                "uid": "5dfe9a7f-11aa-4d03-8935-5a554c277af8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26634",
                "uid": "97c897e5-5c08-459c-8d66-d50709afef0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:08:52Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-stage",
                "resourceVersion": "26673",
                "uid": "44b11290-0c00-4fb2-93cd-b5205f3ffe54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "tssc-dh",
                "resourceVersion": "15345",
                "uid": "6cbd8b8f-7040-4ecd-a81b-d66107fbc92d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-dh",
                "resourceVersion": "15415",
                "uid": "64d09442-d8d1-45cb-ab05-be5638e63af3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-dh",
                "resourceVersion": "15658",
                "uid": "f2a57145-c7b9-473e-bd15-fd1cb5187387"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-dh",
                "resourceVersion": "15439",
                "uid": "92ea8523-e638-4433-b7a4-1ae20b063c7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-dh",
                "resourceVersion": "15675",
                "uid": "75a97a89-00a5-47f2-be56-18e5151b73a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-dh",
                "resourceVersion": "15418",
                "uid": "eba2f777-a62b-4c99-b2c5-9b93ab381aaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-dh",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22799",
                "uid": "ce07de44-f77b-4425-b934-63e247f70e0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-dh",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22797",
                "uid": "17609866-c782-4d68-81af-99537309f1dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "tssc-dh",
                "resourceVersion": "15410",
                "uid": "d17a66f6-3289-4683-8771-d0d5f584788c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "tssc-dh",
                "resourceVersion": "15399",
                "uid": "2c10a746-c8e3-4803-9afb-85ebe0eb08a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "tssc-dh",
                "resourceVersion": "15394",
                "uid": "93f58ab6-c6bd-4d3c-b793-ac9fce80628b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "tssc-gitops",
                "resourceVersion": "15263",
                "uid": "86d9e1bb-9df3-4a8a-91a7-fda3d54ede12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-gitops",
                "resourceVersion": "15431",
                "uid": "081512c2-5063-4f40-bc18-e0c7590a55ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-gitops",
                "resourceVersion": "15663",
                "uid": "4721ed8a-6f5b-441a-9439-840b3d94b83c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-gitops",
                "resourceVersion": "15464",
                "uid": "ea32cf3a-a02e-448e-9021-691d76dda2af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-gitops",
                "resourceVersion": "15680",
                "uid": "20129be8-2938-4782-813e-6afa36a69220"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-gitops",
                "resourceVersion": "15433",
                "uid": "a0a16b10-a521-4e76-8073-c573e87c545b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22808",
                "uid": "3260cbc9-5d2d-467a-aefd-5b91c5e517fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22804",
                "uid": "684de4ca-fa45-4848-b50f-bd73dd7eb705"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "tssc-gitops",
                "resourceVersion": "15417",
                "uid": "58da7949-db7f-4671-b907-201c8349969c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "tssc-gitops",
                "resourceVersion": "15414",
                "uid": "4fc9a307-76cc-4f5b-b89e-fe006619c2ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "tssc-gitops",
                "resourceVersion": "15402",
                "uid": "979c09c7-2a6e-4cc0-8cc3-077fbd18ba64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:02:21Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-applicationset-controller",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19482",
                "uid": "48a47a5c-383b-42c5-b029-22b4334b3472"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-applicationset-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19334",
                "uid": "051fc2c1-e8c2-4f64-9f2e-14417de9ce4c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-dex-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-dex-server",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19295",
                "uid": "210a3906-1fa8-4749-9f6e-8674ede2b3b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-dex-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-dex-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-redis",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-redis",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19361",
                "uid": "7a59a238-3dff-4928-8785-4e2673186109"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-redis"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-redis",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-redis-ha",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-redis-ha",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19351",
                "uid": "0c0f8a93-7ce6-4acc-b3c6-8f2f81af044a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-redis-ha"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-redis-ha",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19343",
                "uid": "2c87a8b7-7d0e-4e14-be52-1cfc90f837e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:02:20Z",
                "name": "tssc-gitops-prometheus-k8s-read-binding",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "37a26dc1-e699-4ca4-ad59-4504560d614a"
                    }
                ],
                "resourceVersion": "19274",
                "uid": "c727339a-75e0-4b2f-aad6-eaf39a712e41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15266",
                "uid": "4777eecb-b763-4592-84de-e92b79fa7fee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15422",
                "uid": "2319f47a-1292-4de3-832b-e53a70209a89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15674",
                "uid": "37bb6cb9-ca9b-48a6-b9be-66a1996e08eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15485",
                "uid": "b9765df8-1f45-459f-bdb9-2aac34f2a2bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15646",
                "uid": "31785c56-82d2-4e69-b4ac-1e7300c5674c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15419",
                "uid": "e706f12b-92cd-44a5-b49d-2bced45be899"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22819",
                "uid": "cbdff3d4-0e67-4ba7-ab25-ef98a730e6ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22817",
                "uid": "e6c920f9-5284-4b6c-9204-179f9bc5574f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:19Z",
                "labels": {
                    "olm.copiedFrom": "rhbk-operator",
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tssc-keycloak",
                    "olm.permissions.hash": "4Z6mzHw3Gux72vIWxroUVRIpSW5IOUFnONBDgt"
                },
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG",
                "namespace": "tssc-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.1",
                        "uid": "9e16865f-ca7a-42f4-a5c6-3fb1462b0b26"
                    }
                ],
                "resourceVersion": "15937",
                "uid": "29d6bd89-2e6a-4f88-adc1-f5f60c1a2e7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-8BEbl7VSay0u4CUNjsIHMYjNfbe63ygBx5JHHG"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15405",
                "uid": "4a648f1a-6ec6-4a59-9b4f-434a0e933eb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15408",
                "uid": "472fc056-8e20-4ac4-bc74-1ba111ad0e9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "tssc-keycloak",
                "resourceVersion": "15406",
                "uid": "d47aaab5-2a75-462b-a34e-4d8662f22ee8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "tssc-tas",
                "resourceVersion": "15342",
                "uid": "5c615f35-d42c-4172-8e13-a3413e5ffabe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:05:18Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "ctlog",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "ctlog-createtree-job",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "CTlog",
                        "name": "trusted-artifact-signer",
                        "uid": "5c14be6d-6f42-4481-ab19-678f8f6a4c14"
                    }
                ],
                "resourceVersion": "21894",
                "uid": "bf999685-fe29-4eb5-b8ca-829079f9c085"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ctlog-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ctlog-createtree-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-tas",
                "resourceVersion": "15434",
                "uid": "d1c2a0a4-1f7e-4c73-90c9-0f1f39329a41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-tas",
                "resourceVersion": "15681",
                "uid": "b141445c-de4b-4c5e-8d3b-77503c41908c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-tas",
                "resourceVersion": "15496",
                "uid": "9ffb7a13-01a5-475e-9115-fcecdfa9043f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-tas",
                "resourceVersion": "15657",
                "uid": "b604ce44-6eb4-4dd9-8518-34cd314e6580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-tas",
                "resourceVersion": "15436",
                "uid": "12d551a0-e8cf-4d92-95cd-0363a93964cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22827",
                "uid": "6ee221b5-c399-4b57-ac8c-aec9bc5dff97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22824",
                "uid": "121ce63f-fe23-435c-a476-0211ab73a0eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:05:19Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "rekor",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rekor-createtree-job",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Rekor",
                        "name": "trusted-artifact-signer",
                        "uid": "1bb40c25-cc54-4a7b-bd48-ead554e364e8"
                    }
                ],
                "resourceVersion": "21989",
                "uid": "03451991-692b-4881-b2be-31bc0f6d5992"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rekor-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rekor-createtree-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "tssc-tas",
                "resourceVersion": "15400",
                "uid": "e33483e4-883c-4845-9e86-166e6635216e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "tssc-tas",
                "resourceVersion": "15404",
                "uid": "19fa8aa0-eb53-4fa8-96a3-73720f363f39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "tssc-tas",
                "resourceVersion": "15407",
                "uid": "3aa80e76-f38d-4638-a6d5-e1c5d4956a59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:05:18Z",
                "labels": {
                    "app.kubernetes.io/component": "trillian-logsigner",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "trillian-logsigner",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "trillian-logsigner",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Trillian",
                        "name": "trusted-artifact-signer",
                        "uid": "53304518-a741-425a-8d44-0011fa2d1935"
                    }
                ],
                "resourceVersion": "21847",
                "uid": "90f78f59-a85c-4aa9-b8ed-52b84ff33604"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trillian-logsigner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trillian-logsigner",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:07:23Z",
                "labels": {
                    "app.kubernetes.io/component": "tuf",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "tuf-repository-init",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "tuf-repository-init",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Tuf",
                        "name": "trusted-artifact-signer",
                        "uid": "a378bf1d-fc2b-4fb5-971a-ee9fcd9e11e9"
                    }
                ],
                "resourceVersion": "24448",
                "uid": "44ce8872-a7d7-4f0f-941f-5f14f4e3a004"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tuf-repository-init"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuf-repository-init",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "admin",
                "namespace": "tssc-tpa",
                "resourceVersion": "15267",
                "uid": "7f65fb2f-7868-453a-9c41-692ecb6136b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-tpa",
                "resourceVersion": "15426",
                "uid": "eedd76d0-f454-4615-a547-ed51a8b6b56b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-tpa",
                "resourceVersion": "15634",
                "uid": "8d2577ce-a04f-4d37-a175-39cff26eaa56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:06Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-tpa",
                "resourceVersion": "15498",
                "uid": "6c8cdad0-12f2-404e-8246-58412ac89e39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-tpa",
                "resourceVersion": "15664",
                "uid": "551e5ef5-d3a3-4eae-84fe-7804b1388f58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-tpa",
                "resourceVersion": "15425",
                "uid": "a0a91925-7772-4798-8050-48a5af26a4f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22835",
                "uid": "84f00699-aa38-41a7-9536-866ff1ed198c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:19Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22832",
                "uid": "f279d9ed-37bb-47d0-86c9-9461741ffc7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:15Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-get-ingress",
                "namespace": "tssc-tpa",
                "resourceVersion": "15778",
                "uid": "f71bbd8e-018f-4b81-a30c-37b765ee8c93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "allow-get-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "placeholder"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:15Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-job",
                "namespace": "tssc-tpa",
                "resourceVersion": "15785",
                "uid": "4e3d1f0a-d65e-4715-8d5b-f5a4314d7814"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "role-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:15Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator.v1.1.3",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtpa-operator.v1.1.3",
                        "uid": "d89668d4-0dfd-4a7e-8a3e-7102d198e94a"
                    }
                ],
                "resourceVersion": "15781",
                "uid": "839f16c3-659a-44d2-968c-ac4017a3ab5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:01:18Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtpa-operator.v1.1.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tssc-tpa",
                    "olm.permissions.hash": "18XbTqmlNKEVyrCAkisSoZMaHZwjC4TinlwwgE",
                    "operators.coreos.com/rhtpa-operator.tssc-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.3-rh-3fL1IkYvKoDCvFu8xg8cnu3vyAd5zyIzYGf2L2",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtpa-operator.v1.1.3",
                        "uid": "1d612d0c-0a53-45fc-ba39-373dc4f7c6de"
                    }
                ],
                "resourceVersion": "16117",
                "uid": "32338912-5087-45ef-89a8-f03aae56f583"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.3-rh-3fL1IkYvKoDCvFu8xg8cnu3vyAd5zyIzYGf2L2"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:deployers",
                "namespace": "tssc-tpa",
                "resourceVersion": "15403",
                "uid": "ec2bde9b-2a37-4cd9-bac4-fd9f58f803f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-builders",
                "namespace": "tssc-tpa",
                "resourceVersion": "15401",
                "uid": "d6a7bc7a-ae50-45f5-9070-f6ee45e0318d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:01:04Z",
                "name": "system:image-pullers",
                "namespace": "tssc-tpa",
                "resourceVersion": "15409",
                "uid": "0ed02789-e410-4898-8a7d-20d89f2ee03d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc",
                "resourceVersion": "15166",
                "uid": "36c5dceb-e525-44d6-ba63-e570fd22eee1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc",
                "resourceVersion": "15167",
                "uid": "b4857529-ace4-44eb-981e-862deeb45a4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc",
                "resourceVersion": "15171",
                "uid": "ccde4a47-33b1-4f9c-b4b2-dac39d636fdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc",
                "resourceVersion": "15160",
                "uid": "4058c0a3-9ebb-429d-93b0-7186d9e3d77f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc",
                "resourceVersion": "15170",
                "uid": "02be6d8f-eb4f-4ba3-b444-029b554264df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22791",
                "uid": "24821a3a-021e-4d7c-8443-246d2e5e2234"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-21T11:06:18Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-xbzzn",
                        "uid": "acc725ed-cfb3-45ef-be15-ca690b47ce4f"
                    }
                ],
                "resourceVersion": "22785",
                "uid": "4dd55dc6-2a98-4474-8aab-75e6e781056b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "system:deployers",
                "namespace": "tssc",
                "resourceVersion": "15165",
                "uid": "f83ddc75-6fd9-41e3-8066-2916c40b17c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "system:image-builders",
                "namespace": "tssc",
                "resourceVersion": "15172",
                "uid": "4b539e9f-2fd7-4d4a-a7ff-104f22b9cf86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-04-21T11:00:59Z",
                "name": "system:image-pullers",
                "namespace": "tssc",
                "resourceVersion": "15169",
                "uid": "dd7de9a1-ddf8-4442-a550-d5264162591e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
