{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:27Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6809",
                "uid": "09f3521c-d984-4216-a61e-d4322eca5317"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:28Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6810",
                "uid": "64f2b559-3d2f-4194-919c-91acad45edac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:28Z",
                "name": "dedicated-admins-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6814",
                "uid": "d92db730-0ef5-4efd-af2e-6bf85401042c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:28Z",
                "name": "dedicated-admins-1",
                "namespace": "dedicated-admin",
                "resourceVersion": "6812",
                "uid": "fb54cda0-2efa-4ec8-b070-4b1185ad5bc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:29Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "dedicated-admin",
                "resourceVersion": "6816",
                "uid": "58a6f80d-1b43-4d02-a8b9-6ac12cf68a63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "system:deployers",
                "namespace": "dedicated-admin",
                "resourceVersion": "5940",
                "uid": "29b09616-abc2-4155-b3cf-06e659409f84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "system:image-builders",
                "namespace": "dedicated-admin",
                "resourceVersion": "5943",
                "uid": "956efb4b-6527-4a78-8a39-eb2596f79f89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "system:image-pullers",
                "namespace": "dedicated-admin",
                "resourceVersion": "5939",
                "uid": "6506ddfb-19ad-4f2c-977c-391884a1fffb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "default",
                "resourceVersion": "5970",
                "uid": "926e1417-c289-4dd0-a047-7771fad1b85b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "default",
                "resourceVersion": "4885",
                "uid": "54b089a1-a704-4df7-9d0f-317d11605937"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "default",
                "resourceVersion": "6581",
                "uid": "9c5f9871-bf17-48c9-ad40-3baf6532a369"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "default",
                "resourceVersion": "5177",
                "uid": "2a0b108d-63c3-4ff5-83fb-c207e5d547bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "default",
                "resourceVersion": "5655",
                "uid": "aa9b332c-6426-4b96-ae11-a263fbca1ddc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "default",
                "resourceVersion": "5768",
                "uid": "290190ae-031b-46c0-a729-539d8998944a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "default",
                "resourceVersion": "4823",
                "uid": "13c14d5e-f2c1-4939-b2a0-755ff5837297"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "default",
                "resourceVersion": "6134",
                "uid": "01d1a0f6-d812-4d5d-82a7-4958ae741bdd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "default",
                "resourceVersion": "5126",
                "uid": "eb232711-243e-4f6d-92c8-5721399919c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "default",
                "resourceVersion": "5279",
                "uid": "9f20e7c4-575f-401f-b948-19bbd979aabd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "default",
                "resourceVersion": "6246",
                "uid": "285a56fa-6a82-492a-9ad9-0abee33473cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "default",
                "resourceVersion": "6286",
                "uid": "7e57328e-5612-4d9d-aa77-18c5b051493b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "default",
                "resourceVersion": "6516",
                "uid": "738ecb3d-2a77-4a6e-ac95-ae05ad545af9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:22Z",
                "name": "openshift-pipelines-edit",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23897",
                "uid": "f4714173-8ee6-4c4d-b245-b7e23b384d35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:22Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "default",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23894",
                "uid": "fb667fa0-5f27-41fa-bd0a-4f6917d30820"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "default",
                "resourceVersion": "12694",
                "uid": "ee80b5bc-9c28-4bbf-8f6b-5b961bbefd71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:deployers",
                "namespace": "default",
                "resourceVersion": "3002",
                "uid": "99d12a9b-fbf9-4197-9953-5fac85247459"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-builders",
                "namespace": "default",
                "resourceVersion": "2995",
                "uid": "fdc312f6-6d50-4fcd-9c5e-70a8fd4a3c18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-pullers",
                "namespace": "default",
                "resourceVersion": "2847",
                "uid": "3baf1b9c-755c-4b32-a924-234c645842dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:default"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6041",
                "uid": "2faf9efb-5876-465e-b692-641bcbf0999e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5007",
                "uid": "ca4ce7a2-a046-485f-a316-d50fd858303c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6502",
                "uid": "52a7691f-2de4-43b1-a448-a63d09962e2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5103",
                "uid": "27e6ed31-cafd-4f28-a3af-088cd5c51452"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5763",
                "uid": "8c10515d-3e5f-4359-8b96-c8198c9845cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5649",
                "uid": "867c4a6b-76d6-46f3-b678-5613c6d97d36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "4862",
                "uid": "4a61644f-7c8d-4dce-b7ea-6bc225c493fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6200",
                "uid": "83860ce2-2438-44ae-8af4-8b91f20ae2c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "5142",
                "uid": "5c43c775-3b74-42ed-a603-a936f8979a07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "5454",
                "uid": "a7d0dc3a-18f0-46c7-8808-17d33f700ba4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6189",
                "uid": "6521fbc8-443a-4567-90ce-5fd1c52cd354"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-node-lease",
                "resourceVersion": "6272",
                "uid": "79117c92-7ddc-482c-913b-63b570ebde5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "kube-node-lease",
                "resourceVersion": "6416",
                "uid": "e2895ab6-3ae9-46e9-bd30-a5e080dc7f9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:deployers",
                "namespace": "kube-node-lease",
                "resourceVersion": "3005",
                "uid": "a2918744-4919-4f78-9cb0-f12c703af980"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-builders",
                "namespace": "kube-node-lease",
                "resourceVersion": "2999",
                "uid": "333d2660-db3b-4f4e-b51b-da697becacac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-pullers",
                "namespace": "kube-node-lease",
                "resourceVersion": "2889",
                "uid": "4bbe17c8-a818-4d14-bfd5-11dea0019a7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-node-lease"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-public",
                "resourceVersion": "5996",
                "uid": "281e024b-741c-4d54-9d8d-35b6c5d2e670"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-cee-0",
                "namespace": "kube-public",
                "resourceVersion": "5037",
                "uid": "94319c02-84cd-4910-af94-d7b665b7948a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "kube-public",
                "resourceVersion": "6517",
                "uid": "dba9fd0a-0532-4c61-902a-e89c1d7a431c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "kube-public",
                "resourceVersion": "5158",
                "uid": "1d6f87b8-265e-49fc-a2e3-89bdfeeec27f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-public",
                "resourceVersion": "5711",
                "uid": "2a38c64c-d3cf-4972-98b2-a7285a4b5869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-public",
                "resourceVersion": "5660",
                "uid": "75f1f8f0-bd3d-4501-b858-4fafe387e020"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-public",
                "resourceVersion": "4954",
                "uid": "5c1312cd-4e3d-492f-81ce-a5913e0d0f3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-public",
                "resourceVersion": "6193",
                "uid": "b5d4e631-8453-4e99-8c88-a478db496fa7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "kube-public",
                "resourceVersion": "5065",
                "uid": "5cf22e46-0f48-466e-b2b7-5e1a59d08ca0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "kube-public",
                "resourceVersion": "5481",
                "uid": "1e0de205-647c-4434-941d-9acc8b3fe865"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-public",
                "resourceVersion": "6248",
                "uid": "d0075816-27b4-446b-beab-4d5a3c56c85c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-public",
                "resourceVersion": "6352",
                "uid": "d65e1797-2113-4dcc-9089-d70885a07b10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "kube-public",
                "resourceVersion": "6371",
                "uid": "4546461b-11a9-4449-b885-c5741e546c24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-public",
                "resourceVersion": "268",
                "uid": "73dc294b-24a1-4e8f-8400-a27b762db8cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:deployers",
                "namespace": "kube-public",
                "resourceVersion": "2996",
                "uid": "0e376b41-6740-442e-ba5b-e56e041ca5a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-builders",
                "namespace": "kube-public",
                "resourceVersion": "3001",
                "uid": "c329e6f7-0a2b-4f3b-a0cb-ec5120018faf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-pullers",
                "namespace": "kube-public",
                "resourceVersion": "2888",
                "uid": "4cf4a5bd-9380-4d0c-aeef-0dc129a6f75a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-public"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "authentication-reader-for-authenticated-users",
                "namespace": "kube-system",
                "resourceVersion": "1688",
                "uid": "fbc205e7-03cd-499c-8690-28c3b5cdf816"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "kube-system",
                "resourceVersion": "6007",
                "uid": "b5dbd4e0-339c-43ce-aa36-4d44e19c49e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-cee-0",
                "namespace": "kube-system",
                "resourceVersion": "5039",
                "uid": "934e59b6-22ce-4c86-88c0-c013fa79eecd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "kube-system",
                "resourceVersion": "6536",
                "uid": "0f00348f-0bc0-4d12-9dca-f6ebd3661b65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "kube-system",
                "resourceVersion": "5203",
                "uid": "a89b4836-53f1-4af2-affd-c41a06f302f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "kube-system",
                "resourceVersion": "5780",
                "uid": "7d1a4e81-017f-4cb4-8b2b-13fc3815f6fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "kube-system",
                "resourceVersion": "5728",
                "uid": "3a7f6ff0-84a2-4c2c-b7f9-51b46de08c9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "kube-system",
                "resourceVersion": "4914",
                "uid": "acb74fb6-5dea-4c86-a7e1-a94e9f3d27c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-mobb-0",
                "namespace": "kube-system",
                "resourceVersion": "6256",
                "uid": "24601750-648a-484d-9472-255fb42fb779"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-srep-0",
                "namespace": "kube-system",
                "resourceVersion": "5053",
                "uid": "18405105-796b-4ae4-8205-cf5575ee4c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "kube-system",
                "resourceVersion": "5498",
                "uid": "29b591bb-b853-471a-908f-faf8c3f9e95c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "kube-system",
                "resourceVersion": "6251",
                "uid": "ee7e7771-be14-4fd9-947f-e235d1b924c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "kube-system",
                "resourceVersion": "6434",
                "uid": "cb054f95-f6fc-4dd6-9660-b881a504291b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "kube-system",
                "resourceVersion": "6489",
                "uid": "259d06d0-87df-420c-8c20-d4fbb002d76d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2601",
                "uid": "e4bcdab4-59c7-40c1-a4b7-b61849f8b8f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-operator",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2593",
                "uid": "a66b872f-09e5-49dd-989e-11748893bd93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:01Z",
                "name": "csi-snapshot-controller-operator-authentication-reader",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1161",
                "uid": "6938f777-2bc8-4234-9c0f-018ee4fd1543"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:53Z",
                "name": "insights-operator-auth",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "854",
                "uid": "e3e92d72-7201-42a7-8483-afcd0f078df9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:22Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server-auth-reader",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "12525",
                "uid": "3ea61b90-9c2b-4670-bad4-98cdd8a35269"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:44Z",
                "name": "network-diagnostics",
                "namespace": "kube-system",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2713",
                "uid": "09c01764-21bf-41a7-9e4c-3474872da3e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:58Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator-controller-manager-service-auth-reader",
                "namespace": "kube-system",
                "resourceVersion": "18173",
                "uid": "2458192c-f174-47e6-af87-1736bb292c3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "kube-system",
                "resourceVersion": "12696",
                "uid": "16a95e59-e1a7-4a9e-a2ce-7de781369bd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::extension-apiserver-authentication-reader",
                "namespace": "kube-system",
                "resourceVersion": "262",
                "uid": "a3d98746-d113-463c-bcab-a2ede4df2d01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "extension-apiserver-authentication-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "263",
                "uid": "7672dafd-2fa9-43fa-ab09-91f2bf6c1b44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "leader-election-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system::leader-locking-kube-scheduler",
                "namespace": "kube-system",
                "resourceVersion": "264",
                "uid": "470f16c3-27b5-4bb3-967a-893c11b63cef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system::leader-locking-kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "kube-scheduler",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:bootstrap-signer",
                "namespace": "kube-system",
                "resourceVersion": "265",
                "uid": "48ccbf87-5442-4320-a462-d71689796d3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:bootstrap-signer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "bootstrap-signer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cloud-provider",
                "namespace": "kube-system",
                "resourceVersion": "266",
                "uid": "ca6fa9c1-85c8-4358-ba82-bfb02cb7e498"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:cloud-provider"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-provider",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:41:53Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:token-cleaner",
                "namespace": "kube-system",
                "resourceVersion": "267",
                "uid": "d53db97e-d30a-4ed0-a072-d697a7675623"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:controller:token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:deployers",
                "namespace": "kube-system",
                "resourceVersion": "3003",
                "uid": "5010f46a-3347-4455-8a2e-17d49ab47753"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-builders",
                "namespace": "kube-system",
                "resourceVersion": "2998",
                "uid": "2992205a-978a-4ba2-96ea-9524c57a7f7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-pullers",
                "namespace": "kube-system",
                "resourceVersion": "2891",
                "uid": "74b91eb9-c0ef-4be7-83bc-5606a7f81622"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:leader-election-lock-kube-controller-manager",
                "namespace": "kube-system",
                "resourceVersion": "1698",
                "uid": "0a70d50b-a689-45cd-80a5-4b388ffef49d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:leader-election-lock-kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "null",
                "resourceVersion": "16109",
                "uid": "5046ba41-f6fb-41f8-b094-8f2be9ba3286"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "null",
                "resourceVersion": "16110",
                "uid": "04a3eccf-1024-4357-941b-b175235c5531"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "dedicated-admins-0",
                "namespace": "null",
                "resourceVersion": "16115",
                "uid": "7c9d03f5-01cf-494f-8c6a-a46bfa219b57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "dedicated-admins-1",
                "namespace": "null",
                "resourceVersion": "16114",
                "uid": "5791de83-0035-4ad3-ba1b-3ef1ae5145cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "null",
                "resourceVersion": "16111",
                "uid": "1d6bdc59-1c51-4554-9d88-d61d49f44e35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "openshift-pipelines-edit",
                "namespace": "null",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23906",
                "uid": "350d4c13-b6f3-4721-a62a-f07bdf8b25b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:22Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "null",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23902",
                "uid": "59fe6c34-b966-42af-9354-ce0c7f6643c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "system:deployers",
                "namespace": "null",
                "resourceVersion": "16048",
                "uid": "22ee5eaa-8665-446d-a844-d04400f50706"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "system:image-builders",
                "namespace": "null",
                "resourceVersion": "16046",
                "uid": "eb320ea3-3d79-41c3-8fb1-2622bbe40051"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "system:image-pullers",
                "namespace": "null",
                "resourceVersion": "16047",
                "uid": "223a4250-2aea-49c4-9227-ddd715c91c91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:null"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "5832",
                "uid": "9091a6ab-57f9-432b-9f79-12ad14acc197"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "5833",
                "uid": "4197559f-1ffd-4ab8-9090-109bb517c100"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "5837",
                "uid": "f86c708f-2b82-48e5-8143-b035c89582a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "5838",
                "uid": "991f75db-77b9-4db5-8a05-5e82fa15749c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "4872",
                "uid": "713ee00a-06e5-44f7-88be-0d64f0dc0c98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "openshift-pipelines-edit",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23915",
                "uid": "c6cf8a7c-d2e6-4c31-881e-9408e3574de4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23913",
                "uid": "c804ff83-f543-48ac-92b1-4cfd7ad51bee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "3004",
                "uid": "96c50256-664b-4537-9344-911208c2f5a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "2958",
                "uid": "6bd773f9-7087-4d39-b9d1-1f66464c0fc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o",
                "resourceVersion": "2890",
                "uid": "c02fcf5a-c8e0-443a-9c92-fcc1c1f08d84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-2q8h9np136ebng8t52e4a09608jpp85o"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5831",
                "uid": "be2a5b53-f6f3-4c34-b11e-53574ee453c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5834",
                "uid": "c40389c1-be09-4621-aa1b-79d4f59c35a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5839",
                "uid": "cea0c9b7-651a-4419-8d56-7d3b724706ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-1",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "5840",
                "uid": "fa0cec9a-95a1-4958-bf5c-f264dba630e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "4874",
                "uid": "74ae2f2d-698d-452a-9244-9d5ad9816e1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3137",
                "uid": "601d45ff-35ec-45e5-a670-62b2e9ee210d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3114",
                "uid": "2274a136-0a10-4be5-b720-f679ad0c8b60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:46Z",
                "name": "system:image-pullers",
                "namespace": "open-cluster-management-agent-addon",
                "resourceVersion": "3037",
                "uid": "4fe37483-eb4a-4b16-981b-78da7fcbe0cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:open-cluster-management-agent-addon"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5983",
                "uid": "4ac1d734-3786-47af-a8ff-f18ed4b1cbb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "4993",
                "uid": "aa4c4863-5c81-4679-a753-e747c8403f69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6495",
                "uid": "70b9b0bc-6a63-457a-8075-de5b88afb557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5069",
                "uid": "35611ba5-7ace-4ccd-bb76-071eb3d15648"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5634",
                "uid": "b8c4a669-fe7b-438e-8370-3fd1de9bad6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5688",
                "uid": "5ca37e45-1078-4f26-a305-1ef62b01c4a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "4865",
                "uid": "4beeaec0-96e6-4c02-8b49-6de2dad96ce7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6236",
                "uid": "2ba62090-7416-41cb-9a5e-d5c40a73f869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5054",
                "uid": "d937b482-b84e-400b-9cf5-cf1eeb0557c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "5402",
                "uid": "5a76232f-41eb-479f-a21e-90133871a764"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6180",
                "uid": "29ca011f-c708-47eb-8525-9b9dd7cbed42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6273",
                "uid": "2fee5410-53b4-4b41-b732-84c4e126cd4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "6387",
                "uid": "46ed8c9b-c403-4e47-b148-0d4850607f44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:52Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "815",
                "uid": "72c40a37-eeaa-4dbe-923b-49589cd3d839"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3167",
                "uid": "a31ad8ef-f906-49dd-a704-9a0816447177"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3135",
                "uid": "be738333-8bc2-4d9f-ae6a-b177726487e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver-operator",
                "resourceVersion": "3075",
                "uid": "20b1fd3d-f2a0-4156-86eb-529dc187ddeb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5901",
                "uid": "7e6cf521-671a-45fa-9699-019f2338411d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5022",
                "uid": "f549e238-5e97-4daf-8137-270cb2162097"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6469",
                "uid": "2111e96e-2cc3-4710-a10b-73e164bcc215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5184",
                "uid": "c60f36a8-210e-4a7c-b572-c14eaf06a869"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5750",
                "uid": "3a35aa7b-0f1c-471b-bd8b-26d8c1615dda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5664",
                "uid": "dd7e7819-fb0d-4417-9a0f-e898881d0edc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "4985",
                "uid": "a5171e51-eaab-4ab8-9d8d-57fb73fcd950"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6078",
                "uid": "f369350a-20fb-4b00-9d1d-861d18037cb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5145",
                "uid": "ce953792-93fe-4d96-a6ac-eddbbb20d550"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "5238",
                "uid": "649043f3-a7cf-4895-a9a8-a756eb23b0aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6201",
                "uid": "b18fe14a-ccb5-4543-a155-5fc5d696c2cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6259",
                "uid": "f2b7c15c-426d-454b-a927-b94e3c26ab2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-apiserver",
                "resourceVersion": "6491",
                "uid": "22092ae0-e85b-4b82-b5a0-87f372e1b58d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:12Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-apiserver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1842",
                "uid": "863ba3a5-439e-46d5-a123-475129441931"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3136",
                "uid": "18d4604c-eb2b-4b26-b8b1-25bbb781bb3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3165",
                "uid": "c5ee8cf2-f30c-4937-a32f-23f70119fd19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-apiserver",
                "resourceVersion": "3076",
                "uid": "433b774e-9d3b-49c6-a131-1701c93c3b83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5986",
                "uid": "e91a5381-e7ce-464a-b4b7-3e2457cc9b53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "4942",
                "uid": "48f5f9c8-305b-4e6c-8493-a26abb11e9e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6584",
                "uid": "1afb55b0-7a38-4ade-9341-f1188e07a298"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5205",
                "uid": "4754f4b5-9a51-488d-a814-8f3a559d3e0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5827",
                "uid": "74abd239-c13f-4029-a475-26da49db54d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5675",
                "uid": "db3bdb62-4949-4cea-8c43-9fc9d351d772"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "4869",
                "uid": "502fcb33-eba4-4720-9f90-6e50f54d20b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6159",
                "uid": "04c1658c-fea6-4086-a56f-7a4aff6209ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5061",
                "uid": "999d7f43-4957-4850-84f8-3e0912212420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "5507",
                "uid": "d53f6c59-f2e0-498f-a399-76f8318bd6b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6232",
                "uid": "8989a27d-3f39-4fbd-b25a-d52c1f6f08a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6415",
                "uid": "99c86233-4d21-41e3-bdc9-8bb1945e426a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "6518",
                "uid": "e9b90ed6-8dc6-4932-a87d-26527aaa7cd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:28Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2271",
                "uid": "0dbd8535-0d4f-4c45-8493-dbb995c65ef4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3237",
                "uid": "b7e5171b-8610-44f6-97b2-84169952bc6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3213",
                "uid": "eb12b089-4e7b-4c65-93bf-230819411072"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication-operator",
                "resourceVersion": "3168",
                "uid": "bee67682-c749-4ed8-bdc2-d20e24d5220e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5985",
                "uid": "83717fcf-897f-4818-ad2d-a1dbe5edc761"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "4906",
                "uid": "a3abe7d4-83d2-4c98-9c0b-8eff3d67aa6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6606",
                "uid": "c0dcafc7-1569-45fc-bbb2-196722583357"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5135",
                "uid": "95344bbf-9d31-4fdd-b879-931543eb4bd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5729",
                "uid": "940166f1-362b-47c2-80b6-d4c34bd14211"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5718",
                "uid": "b2bef5e9-354b-4a57-b388-0f764fde16e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "4973",
                "uid": "23722bc9-b550-40c3-8f70-c5a35260abb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6245",
                "uid": "6cc99080-6096-4893-af5d-263d402a6753"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "5153",
                "uid": "36d014a3-8e17-4475-b323-f35ec2ce32f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "5455",
                "uid": "e46fdd10-acd2-4365-98d7-61d10ca5d759"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6132",
                "uid": "5249a9f0-4a65-4f00-9a64-f15f01642cbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-authentication",
                "resourceVersion": "6378",
                "uid": "3475bdb4-3148-4044-a4b2-8f7ca9bf932b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-authentication",
                "resourceVersion": "6389",
                "uid": "b9d2fc06-c320-409d-a2fa-560bf3b85bd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:29Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2317",
                "uid": "0cf4574c-a295-4485-9619-cd739b95f749"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-authentication",
                "resourceVersion": "3166",
                "uid": "1fc0fd46-6142-49b9-ac31-d085b0c28da6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-authentication",
                "resourceVersion": "3164",
                "uid": "865d3da8-9992-4337-a3f4-9cf6a7a2c76b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-authentication",
                "resourceVersion": "3074",
                "uid": "1cc5f42a-88cf-4764-99b4-a9510406fc77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5896",
                "uid": "5a368159-fa3a-434c-b64b-3f96e9f91000"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6622",
                "uid": "1c0fec32-c769-4b84-accf-e27309d72b18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6607",
                "uid": "b529f164-eb1a-4e83-82f1-cfbb6842c8b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6754",
                "uid": "1c52ae6e-14fa-4fcd-ac81-0e1b061c2f41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5726",
                "uid": "164788f9-af50-45dc-a9e0-e5af09af8f8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5702",
                "uid": "b6fe11c7-2d9d-4f55-b8e8-2f2540c812a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6562",
                "uid": "e690bb54-b277-4010-bed5-423d31cd4c42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6116",
                "uid": "ee5ad83b-d9e9-4990-a1c9-1175d655b7ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:15Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6667",
                "uid": "f673d377-0f86-43ca-8124-13cd7d5508aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:26Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6803",
                "uid": "d36e4d1b-19b9-436d-bcba-c962f1430fd7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6167",
                "uid": "1588bb06-d52d-4835-a6f6-c421e89ba3a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6408",
                "uid": "9201003a-a923-4364-a59d-2820d31560bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "6439",
                "uid": "3d834ed2-3b46-4675-8e70-5cfb17db0009"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5470",
                "uid": "469eebd0-ea26-4340-85b3-948f9d6fa0ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5310",
                "uid": "3f08f715-902a-4f15-be7c-55f957074364"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5312",
                "uid": "fbe1e3f7-c608-42f7-bae0-406f06cac978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-ai-agent",
                "resourceVersion": "5311",
                "uid": "fd02e2c4-f5a1-4275-9f87-c7b98ef4fd86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6008",
                "uid": "8885853f-35ba-49f6-8e1d-c9989b3414e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:11Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6632",
                "uid": "7511e967-16ab-4b1a-9ce0-da0ebccbc4ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6540",
                "uid": "92f80b85-c15d-407f-b23f-3f2f56392ba8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:16Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6679",
                "uid": "7f45fd50-dee2-432c-a149-1c2e70ca72a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5781",
                "uid": "37e0f658-5278-4383-904e-1902bd2aec3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5782",
                "uid": "c23a4f74-0ac8-4460-b272-ec3dc06e7129"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6625",
                "uid": "45d8fa31-1222-4967-beb7-fae8c03932ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6096",
                "uid": "70d0a4dd-83ee-4d63-b8bf-d9310ea5ba45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:12Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6642",
                "uid": "0b94c1b9-8851-4082-ac9e-33115048b407"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:24Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6789",
                "uid": "7bdbb8e6-fd84-4ffb-b4e2-5140b054822c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6135",
                "uid": "72f5c91f-6d32-40fd-b483-8ea5edd12270"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6396",
                "uid": "a798b241-eac8-4301-ab53-36bf54cec79d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "6470",
                "uid": "2cec5f5c-0cd8-43c0-891b-1b082ec929b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5474",
                "uid": "a8748a65-7573-4f0d-8cda-b5a582646874"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5334",
                "uid": "029084ac-2714-4795-a473-573654f5e46c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5336",
                "uid": "2b402c09-469c-4124-b04d-3e31be157a82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cee",
                "resourceVersion": "5335",
                "uid": "bbbc4063-6d34-45fa-a27e-396d71670b54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5862",
                "uid": "ae6a6928-8444-4b72-a0bc-322999b11899"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:12Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6646",
                "uid": "f0a507b6-12c8-444e-b5b9-571f245f37d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6567",
                "uid": "c5df65e7-77bf-4e1a-b366-31af92eda3b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5058",
                "uid": "a5a7c40a-bc20-4e7d-95e8-238043dc31fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5778",
                "uid": "1176098f-5121-4a18-8c69-3e800714cbe5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5731",
                "uid": "81f5fefa-583a-4d08-94a8-ba6cb88f0f4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6573",
                "uid": "306d629a-5474-4d50-9a10-a59c61d8711a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6093",
                "uid": "b2e13a2f-1a56-4d78-b029-8254d45fe711"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5133",
                "uid": "60e42d90-2454-4e6b-a281-6950f323886b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5359",
                "uid": "ec1286ef-1d17-43e9-b46f-109d097c240b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6206",
                "uid": "ee56d5d7-6aab-4f01-ac02-e19385976506"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6261",
                "uid": "a8056728-6df1-431a-9b52-592c03d2f436"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "6449",
                "uid": "cb326687-2374-4444-98db-f85cdfe5076d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5475",
                "uid": "82afd856-36f7-44b7-b13b-826aaf3858e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5030",
                "uid": "34f516fe-2ef2-4c6d-b8c3-277124e76461"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5034",
                "uid": "e26259b1-dcf6-428f-89c9-dfb8878d7f71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-cse",
                "resourceVersion": "5029",
                "uid": "620799aa-419e-4ea3-b64d-1339448ba481"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6061",
                "uid": "6841bcc3-75d0-4635-9bf6-7201e78349cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6660",
                "uid": "0ba98226-9f93-4267-8284-140053cafe5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6611",
                "uid": "155912be-c7c0-4c13-a05e-66431d3ae6ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:19Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6741",
                "uid": "5f118e51-a177-4d46-ae83-ffaedee9500f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5665",
                "uid": "810f0e39-2efc-4224-8a21-bd26bf52704d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5652",
                "uid": "a7bc33ae-7085-4140-8d5a-8f6ec999dd55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6627",
                "uid": "1e4cd9e6-de61-4cbf-899f-399bf4287bb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6114",
                "uid": "64ba22a5-a58b-46f3-959e-0b866d9f75a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6633",
                "uid": "7640e43e-1092-42f5-8f03-32e2644421c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:25Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6796",
                "uid": "71a7a1eb-1dbe-41f3-86f5-84d99e8dfdf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6144",
                "uid": "940fde77-36f2-4f89-91cc-a419018aa5be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6398",
                "uid": "09f564a1-aabc-4f4c-8ba9-f37fd4597a6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "6451",
                "uid": "f4391d96-6941-40ce-8e80-181ae0547e46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5463",
                "uid": "7cf70abc-a954-434b-846b-f0ddd5c5245a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5380",
                "uid": "dcb94fe8-4bbb-4e32-b0e0-6eaf04d582f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5382",
                "uid": "6f030764-9526-49d0-819d-8d8e97233d5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-csm",
                "resourceVersion": "5381",
                "uid": "0befee4f-daa9-4c3a-adda-f87f97107abf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5956",
                "uid": "c4f4b0cc-0dd3-4d93-bc3f-1e7f2d6a53b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6623",
                "uid": "3a7f531f-8a77-4fae-951f-8d1853b61502"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6559",
                "uid": "9dddfcd2-9943-41be-a6b9-fd36aa06f4cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6751",
                "uid": "00216801-f4e0-42fe-93e7-62a4b7886367"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5814",
                "uid": "578ea640-8e2e-4126-ad5b-71fe729fcd97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5677",
                "uid": "a0a874f7-0938-4122-aa67-2513d31ce643"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6617",
                "uid": "8f82484f-6cc1-42d8-bdfd-c4d605ab06b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6120",
                "uid": "8e8ac27c-1849-4e22-a374-59c860ca323a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:15Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6672",
                "uid": "8bbff2b1-0fe2-48b4-a16a-4477c02de1de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:22Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6778",
                "uid": "5bc3dae3-32de-4d1f-8766-c0be8308d492"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6284",
                "uid": "ee6d618a-6b0c-47cb-b1e9-66c5adad7d51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6335",
                "uid": "00e6f987-8ede-4e6b-8f39-c14e1a1422c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "6537",
                "uid": "a45434d3-a29e-4f4a-b73c-416de1da1a24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5467",
                "uid": "576069d8-4a68-4cf8-8a10-f45d5c92af97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5422",
                "uid": "02c02355-928c-46c5-bedd-306aa71e8c62"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5424",
                "uid": "6cccadc4-90ca-49ac-bc93-31d335cf658f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-lpsre",
                "resourceVersion": "5423",
                "uid": "b3cc8112-0c24-44ea-ae41-30e639bd2bf3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5998",
                "uid": "0155058d-2fc0-46bc-b792-66fd07a67fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6664",
                "uid": "84e50f9e-c6ec-4211-9062-640dd234a424"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:18Z",
                "name": "backplane-cee-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6728",
                "uid": "a6b5a194-54c6-42c2-b82d-c97001836558"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6496",
                "uid": "4f60ed10-16fa-4d60-8b84-12b895c418ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:17Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6716",
                "uid": "4458680d-bf85-45f1-9325-d414684e1570"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:18Z",
                "name": "backplane-csm-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6738",
                "uid": "f9ff2cd6-59c0-45b3-8208-c49e07f350e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5635",
                "uid": "df5b5a63-2b72-4f4e-96b3-1d5cf95bc94f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5736",
                "uid": "c419b9a8-def9-4409-a6dc-972d5599b8e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6594",
                "uid": "0984238a-4cbe-49ee-b2f0-8066305073f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-mcs-tier-two-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5621",
                "uid": "1cee09eb-dcc7-4fdd-b1d7-310f506f7713"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6148",
                "uid": "d26df269-9ea4-49a6-8357-0323433b906a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-mobb-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6060",
                "uid": "bc6aef13-b079-4c64-9a8c-05a9368eba50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:14Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6658",
                "uid": "a3fab669-fdab-4cbe-bef3-88be128e8fe7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:22Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6771",
                "uid": "c59b290c-76c2-40f4-a01c-aedbe0d40949"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6337",
                "uid": "609c4fd4-cd46-4792-8fed-151b59d939a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6119",
                "uid": "19255da1-331b-4ba1-a139-9571f63a9458"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6331",
                "uid": "1e52f3a5-7866-4805-a15a-1f840c177fec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6423",
                "uid": "84e0df8e-ac59-4f3a-9909-b02cf7537dc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:21Z",
                "name": "backplane-tam-pcap-collector",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6769",
                "uid": "af58dfc5-184a-4e49-bc28-f28150342aa5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-pcap-collector"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "osd-delete-backplane-script-resources",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5999",
                "uid": "13dad67a-9d62-4f05-a159-deb017722134"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "6755",
                "uid": "ef588ada-e5ac-4d83-8aa1-5d734394ce34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5541",
                "uid": "dc2fbdb4-4b76-4d82-bd50-81e612031034"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5542",
                "uid": "38a383dc-9a68-4959-8987-c8b28661c9f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-managed-scripts",
                "resourceVersion": "5540",
                "uid": "65d60704-bc81-45b2-a824-678abdd51a90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6049",
                "uid": "1f8ce205-233b-4cf7-996a-fc31c7b936aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:15Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6670",
                "uid": "b7f24582-4392-4210-ad44-3e1c1ffa067b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6585",
                "uid": "9d74b0ae-43b5-4d79-bc98-c471131b7efd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:19Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6742",
                "uid": "728ee9e8-2635-4fc0-8cf3-9d5e4b2c0a34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5715",
                "uid": "3878ceb3-1190-4221-9dbb-9cd3b8244dbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5626",
                "uid": "94c7a5d5-df15-4f59-ad13-2c21be054616"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6556",
                "uid": "06172f25-5089-4c54-be2a-ffc4733ae53c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6161",
                "uid": "79a1d107-fccd-430e-a204-3fd0624217ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6635",
                "uid": "bd62e7de-aa73-4f0d-b87f-e21e74361b9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:23Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6786",
                "uid": "3bf5ed4d-8e7b-486a-a3f0-3edc53422297"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6146",
                "uid": "9dd5b19e-8420-48e3-a29f-a58437a47b45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6354",
                "uid": "7a4adbde-2662-4489-92b6-bdd2811a2f9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6539",
                "uid": "823198a3-e440-40c5-9034-d09dad1dedb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "6757",
                "uid": "306d9b6d-8b18-495d-bb9a-6158cfb40eb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5601",
                "uid": "ec540d22-40fe-421e-a7cf-02a3b4903b46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5604",
                "uid": "4bb2fec1-cb4a-4d57-b143-f48b69437028"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mcs-tier-two",
                "resourceVersion": "5603",
                "uid": "9d8b3b33-e7c9-4309-a279-1de4ed87ceae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:29Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6819",
                "uid": "4ad6a746-c3c4-4648-99dc-3fcc6809df4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:12Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6639",
                "uid": "f1cfb65a-064a-46ec-b1e6-d91a4cc88fcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6570",
                "uid": "54e7b1be-28f4-40d1-b883-cc909845a660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:18Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6736",
                "uid": "91c0755d-0c0e-4c1b-b05b-d08249dfe8c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6829",
                "uid": "201266b5-6813-41d3-9f56-37ed777bc14b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6805",
                "uid": "07ac84c1-3a0c-4ced-a9c5-b22a472870fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6628",
                "uid": "72b43648-5f37-4cd8-a51c-ce5f4460e185"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6186",
                "uid": "98eeb867-205f-4f5b-86b5-caab161ed3f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:16Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6676",
                "uid": "e68e4952-8246-4c32-9e0b-e8e079b8a990"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:23Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6783",
                "uid": "0adbb345-3d46-4a15-96fb-35b25da483f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6285",
                "uid": "f2969c0b-8488-467d-84e5-6ae51f6dd3a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6400",
                "uid": "401434f2-456c-4a36-b4fd-afda12caa056"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6482",
                "uid": "d4ff08a9-96c8-4149-b33c-82fe44f64da8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6758",
                "uid": "4f6dcba4-b3cb-49ed-a6eb-917a78831520"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6046",
                "uid": "5fc19319-e978-4c04-87b7-369271c9ccaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6047",
                "uid": "a9404324-4a62-479d-b522-fe661d4951c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-mobb",
                "resourceVersion": "6045",
                "uid": "53161bb7-a467-48ae-9c45-a88220d691ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5911",
                "uid": "162da49a-53a6-40aa-aacb-c050fdd15ced"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "4995",
                "uid": "aa7143ce-7612-4369-abce-3f0d7c21eb6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6587",
                "uid": "bd26eaee-1145-4a7e-a479-6c6d5ed80f56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5120",
                "uid": "8d49f78c-a063-43fb-9df1-46ab68e83033"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5816",
                "uid": "eb6ed415-ae49-4546-a666-d02b2711542e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5770",
                "uid": "5f501a6b-a792-41b3-8ce0-15fc8e05ff58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "4893",
                "uid": "6b0c048a-77fd-40bc-995c-9f489039fe0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6247",
                "uid": "9a474352-3d75-4870-91bd-1ba66553fc9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5067",
                "uid": "9ad3c946-ff29-4308-b9d7-77a9d60f0ede"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "5514",
                "uid": "874be566-69de-4cda-a600-e1f32083dad1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6181",
                "uid": "ba22e5c7-f450-4d8e-869e-6b43c095a92d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6438",
                "uid": "904ecd09-e74e-4bb4-9ee9-dab0b1884b3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "6474",
                "uid": "74654e0a-dab1-4cf6-8f07-53b921b9b73e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "4868",
                "uid": "94fb2cc3-bbc6-4a67-9a81-6761d956054a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "4795",
                "uid": "955da6b8-3e62-4965-9648-c3c1fe106835"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "4790",
                "uid": "fb2aea22-f6c0-4bc3-a464-875c164d8ba3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep-ro",
                "resourceVersion": "4796",
                "uid": "562bc683-5015-440f-be23-a38efcfcbc7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6832",
                "uid": "8252524c-b898-442f-99ad-ab17f8dde14b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:14Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6662",
                "uid": "6903bfbd-0ee8-4dd3-bc70-25cee78449d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6490",
                "uid": "791880b0-eb50-4b76-b3af-a303ddee7b4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:21Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6766",
                "uid": "b11d0719-75f3-452d-b1be-c38040d0c2ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:32Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6830",
                "uid": "fbfd3c90-04ad-44d1-abea-cde8dafe6239"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6777",
                "uid": "390f4db4-d250-4425-952f-74e584ff8e32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6577",
                "uid": "5e285a35-747e-455d-bddd-11c78ae58631"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:35Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6843",
                "uid": "b9815c28-d277-44c2-922b-089e892cb98b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:15Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6669",
                "uid": "597ab085-ee0d-42eb-886a-f6f0fdc86a1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:24Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6790",
                "uid": "ff4ca7a1-5844-48e3-8efa-d911e6abaa69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:35Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6844",
                "uid": "df6c25fc-f88d-43bb-935d-db66196c45df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:40Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "7049",
                "uid": "f253cfe7-7ead-4bd8-b1e9-b84715254d29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6372",
                "uid": "5b48f334-cb89-4c51-adee-5e38a9c58905"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6753",
                "uid": "ac00948d-42b0-48de-96c5-ee6056d00cc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6318",
                "uid": "ec0bb8b6-939c-433c-89ae-0531e077f09e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6315",
                "uid": "d9f7a705-f4be-406a-8c82-330c8637dd8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-srep",
                "resourceVersion": "6317",
                "uid": "af39f072-a628-4edf-9cbd-035c932cb5ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5914",
                "uid": "4e26a9cf-9429-4f25-b726-e287b7b8d5dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:12Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6647",
                "uid": "a65e9b00-838d-44c2-a71d-ef0948f6f3e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6597",
                "uid": "f871ed71-cd65-4367-88df-ca69a667604e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:19Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6744",
                "uid": "a748f651-6eb3-4c03-8e2a-8a2cfdaac3d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5657",
                "uid": "df61c18f-c6f4-4ce9-a749-6f61737ea1dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5690",
                "uid": "21e9ca84-45cb-408b-a4d2-85fc6cf09bfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6605",
                "uid": "2b4fa5b8-1c78-4cb2-883c-6382a6b07ba2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6139",
                "uid": "bc6810a5-1a91-498c-b5eb-11b048030dc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:16Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6678",
                "uid": "36c15966-c1fa-41a3-b85d-91140778314d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:24Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6791",
                "uid": "15223175-678d-4745-a5d2-7ca80ea864f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6202",
                "uid": "322128ce-7bbb-4fdc-b462-efa40657b4b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6417",
                "uid": "357ff62d-3543-48d3-90cf-b840c965f36b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6454",
                "uid": "b988e508-52ab-4dde-9892-8d41bca3e5fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:21Z",
                "name": "osd-delete-backplane-serviceaccounts-0",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "6760",
                "uid": "ad426e7a-0776-46e7-bb0c-1394c9b135c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-serviceaccounts"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5508",
                "uid": "ed191991-9077-4e98-9456-968de8134d1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5505",
                "uid": "ceb5a6b0-0fa9-495f-8423-2aa40399d2bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane-tam",
                "resourceVersion": "5504",
                "uid": "1159b623-bb9b-4197-9a98-a13c6fc5449a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5903",
                "uid": "9fdc3aeb-e954-427f-b6fd-2302ea27c3dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5041",
                "uid": "55ea8f64-4f15-4c44-8304-aa030bf38919"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6471",
                "uid": "56a514bb-251d-446a-998a-3e797e5a740b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5161",
                "uid": "89fcf8b9-c901-4373-a07d-b04ea2d17f8a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5713",
                "uid": "00c8c119-92fe-4b88-87cd-c1e029efe462"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "5712",
                "uid": "efd35067-5784-4cdb-9523-a7f8fa01f978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6590",
                "uid": "413f4ed2-7725-48b3-b79d-9d6110fffce9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6230",
                "uid": "6b494690-b1cb-41a6-98c1-b83fb27ef318"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "5127",
                "uid": "ec64582c-4bcb-4514-a878-efcbfd760bc8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "5332",
                "uid": "5bc131c2-f776-4d62-ae18-93b955e89995"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6234",
                "uid": "e3dd8793-1aef-4ac9-a79e-5e3a043ed11d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-backplane",
                "resourceVersion": "6275",
                "uid": "3db38b05-d6f4-4b00-b3d0-24898d23b002"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-backplane",
                "resourceVersion": "6356",
                "uid": "5820b7cc-63a0-4033-9344-fd800bd337cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:deployers",
                "namespace": "openshift-backplane",
                "resourceVersion": "4867",
                "uid": "25f00a24-1d81-43a5-968d-c4690ad302ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:image-builders",
                "namespace": "openshift-backplane",
                "resourceVersion": "4866",
                "uid": "c5f87fe8-d299-4233-859e-f8a20a9a47f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:image-pullers",
                "namespace": "openshift-backplane",
                "resourceVersion": "4863",
                "uid": "7e5d9dc5-623b-48b0-a94c-751afa5702c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6064",
                "uid": "f13708e9-2da2-4b16-a69e-f50a70aadf68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "4887",
                "uid": "02e537a8-e7ff-4ed9-aa81-96120b0eeb2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6614",
                "uid": "45d293a9-b3a0-4532-9add-1fc6a8bc9b5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5093",
                "uid": "dbdee4bf-2ab5-45bc-87ef-c6d6866cec05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5637",
                "uid": "326b261d-10e8-4bbe-8a75-c48ecf4668d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5656",
                "uid": "4d3972ca-3526-45cc-8fe7-3714a6859297"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "4902",
                "uid": "5688ccab-5826-4db9-ab57-ebcc437d02c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6163",
                "uid": "b8dfa646-9b0d-4b5b-a63d-2ff6130c65eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5057",
                "uid": "371bda35-91bc-4dc9-8c54-44b329e3a2c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "5456",
                "uid": "1409c87e-52c9-49d5-85bc-0941314e2c59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6156",
                "uid": "329847ad-38da-42ff-bb14-462b149c0fc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6453",
                "uid": "3c4455ac-14f1-4672-a52c-3ba2185cefe6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "6360",
                "uid": "da677596-f569-4b9d-87cf-b0a515a6645d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3239",
                "uid": "94f505c7-8b52-43c9-b9ca-419ac4d9786b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3240",
                "uid": "5aa094bf-a695-46ec-9a99-67d987468317"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-controller-manager",
                "resourceVersion": "3211",
                "uid": "1a2411ba-1bde-42a0-8207-cd65aa855d7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5960",
                "uid": "6a396980-8180-434f-bd93-99606aabd3e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "4911",
                "uid": "edfc24f6-3db6-48ef-87fb-19198376df7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6476",
                "uid": "e233b64d-b498-49ec-b8c5-61989c292c97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5167",
                "uid": "c89c949f-41c3-4207-97d8-3dab4ec5ad45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5659",
                "uid": "7557f93d-a4f4-433f-b327-7430f927216d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5608",
                "uid": "b41bb311-4c6a-4f28-9d76-9521b035209a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "4931",
                "uid": "78879552-f437-4f48-89dc-b6d66c1afd42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6210",
                "uid": "7b9618bc-2fb5-48fc-91fe-1b6b0f057b23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5115",
                "uid": "ac44f8c1-f2c5-44c5-8b07-aa5c7d2803c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "5438",
                "uid": "7969d733-dcea-4d18-a328-9beec6a9c06e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6208",
                "uid": "84ab2dcb-ecd3-402f-b871-1a33ab072dd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6410",
                "uid": "25263cde-5fd4-47bd-83ec-725bb3d3199c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "6521",
                "uid": "587ea7b2-acde-4d84-9cb4-40e010c0e481"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:59Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1093",
                "uid": "58c9474c-71f5-42be-83ad-525caeee8e1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:49Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cloud-credential-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "727",
                "uid": "13349900-dd9d-465f-9109-9560c29133c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3352",
                "uid": "c5ac05e5-a6e7-44a4-bbe4-d9f08e358ce3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3350",
                "uid": "510e6c77-67f9-4c30-8ed7-323b518df5c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-credential-operator",
                "resourceVersion": "3212",
                "uid": "5ac97b68-ced8-4bb4-acec-7dc8e7165b2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6083",
                "uid": "6dd09ab3-79b1-4cef-b49a-e5cddfa5b613"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "4944",
                "uid": "7b8b7451-6da0-4e77-9411-16584574c843"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6561",
                "uid": "b0beb2c4-ac57-4fdb-aee2-bd121dc77097"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5207",
                "uid": "aa9c855b-fdfd-4393-b09b-9bb2d172aa49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5733",
                "uid": "5b14d3a7-8abf-498c-8d5a-81ccd1974a9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5618",
                "uid": "30da4e12-43fd-481b-aa2b-254aac6f3469"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "4957",
                "uid": "e6e3b3d9-ae6c-4aa3-90c8-061d83aa2683"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6151",
                "uid": "fab66265-caf8-4fc5-ab90-560c189fc3d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5084",
                "uid": "2b633f8d-509a-4873-87d5-4e6d36d6ba3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "5441",
                "uid": "c563f361-ab34-438e-a10b-af6410e40061"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6122",
                "uid": "fe27d710-39ec-490b-b727-c7208ddba713"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6293",
                "uid": "a1ff9788-cb60-4a77-b837-ee49699ac037"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "6463",
                "uid": "86f99c23-782b-4f92-8bbe-1c82b496271b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:28Z",
                "name": "cloud-network-config-controller-rb",
                "namespace": "openshift-cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2281",
                "uid": "ff42aa1b-e3f4-4802-ae90-07c739cc002a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3353",
                "uid": "bf318979-edd5-45b0-9492-4a06200e2c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3354",
                "uid": "b603e141-a71e-4469-a971-bfb5a39973ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cloud-network-config-controller",
                "resourceVersion": "3185",
                "uid": "0ef44b49-516e-48c6-b497-b681e29eef6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:15Z",
                "name": "aws-ebs-csi-driver-lease-leader-election",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "2006",
                "uid": "6a34f7e0-e57e-4c2b-97a7-993573876f3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-lease-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:07Z",
                "name": "aws-ebs-csi-driver-operator-rolebinding",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "1474",
                "uid": "122e5b08-c0a8-4e4a-bff1-11b0a39a15c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "aws-ebs-csi-driver-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5865",
                "uid": "13a3fb66-7104-4d97-adb2-bdc87fd37aef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "4946",
                "uid": "fe3aa469-c9e5-4cfd-9a99-939da22419fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6542",
                "uid": "fa60706b-1d63-4466-ad60-81d11bcf5e60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5123",
                "uid": "4e9cc61a-7524-4d03-b09d-33b2b3d1d94b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5771",
                "uid": "213665d4-c305-4b98-9450-9c536711f28f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5758",
                "uid": "c4599779-cdd2-46c5-a1d0-cb7461b61ea9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "4831",
                "uid": "29d704f6-b129-415a-b75d-f0ff1b601eea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6142",
                "uid": "84e8761b-3f09-46a0-a196-e754a2ccbe35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5206",
                "uid": "5418854d-166b-455e-a504-02aff7a34100"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "5387",
                "uid": "97a9577b-2f22-46e7-ad5e-edee24754420"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6149",
                "uid": "53853951-fc3d-43f6-ab78-a6cc021b204d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6421",
                "uid": "03671233-33c7-47be-aa37-dec4aa1ffe9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "6457",
                "uid": "27a16b17-0cd9-4031-8af1-36c4e50eaa01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3306",
                "uid": "22760e45-bf25-4118-add1-b81d29088dd6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3348",
                "uid": "1dfe5af1-9ca6-4bf3-8953-3e185605be26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-csi-drivers",
                "resourceVersion": "3214",
                "uid": "5a4d40f0-1a40-433d-95a1-2ad2da4e10a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5988",
                "uid": "5bc1b021-d0ed-4729-8eba-2adc1a9c46d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "4913",
                "uid": "659ba5c7-54ce-44f1-aa00-40c44e4336ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6578",
                "uid": "58976f09-62c1-493e-b89a-cfe3eaa6cd6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5138",
                "uid": "736d50af-bf70-4a27-87a0-aad56cfc5864"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5752",
                "uid": "17b4c7b4-b9de-4e4b-aed2-62a6b55a2ad9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5759",
                "uid": "63454e3b-0dd9-49a4-82eb-91dfd591e346"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "4905",
                "uid": "42ae1249-9dfd-4218-af70-50908a37fc70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6249",
                "uid": "8ee13035-0571-44a3-bfd8-5615c3bb11e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5197",
                "uid": "1f0f66ab-fe69-4186-940d-6634e58cd276"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "5425",
                "uid": "0d18cbea-0741-4895-83d4-59df00b96b08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6160",
                "uid": "423498d6-f385-4781-9a7d-96adaca9f1b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6402",
                "uid": "f9cc40b6-6d37-44aa-9c07-b1651cdbbfa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "6541",
                "uid": "c0d1027f-af0f-4fba-9d22-d46131ee4c9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:52Z",
                "name": "machine-approver",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "830",
                "uid": "a8051d87-58fa-461f-9718-8743dd5054e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "735",
                "uid": "48b10b3e-1e08-4033-9a2c-b58ac3924a48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3392",
                "uid": "0c424e65-a5e0-4aa5-a2cb-995a8b4048ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3390",
                "uid": "5fb4681b-e1cf-4de9-9482-fb03ff1ff105"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-machine-approver",
                "resourceVersion": "3271",
                "uid": "4bc65ded-afc2-4727-830f-3b970db0a101"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6066",
                "uid": "c9d53e9f-4fc1-446d-b14b-ca9be732bbf3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "4878",
                "uid": "aa90030b-01f4-474f-9526-96f09fd4daee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6478",
                "uid": "28fe2a62-ef07-4a49-9cbf-9fe199ad2a33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5070",
                "uid": "5cca3b8c-60f3-4111-8f54-7755dcea4e95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5830",
                "uid": "35b58a8c-f2af-4492-bc1e-f2607301a2c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5762",
                "uid": "6282c332-82e2-4f97-a578-b02074657296"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "4934",
                "uid": "750fec2e-56c9-4b95-9ee2-669427a191b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6079",
                "uid": "e451d85c-fc86-4734-840d-f6bf065a904c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5155",
                "uid": "25ab7ebd-25ee-450f-90bc-84492036b991"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "5446",
                "uid": "dc43f34c-c986-451d-a14c-d73084c23580"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6097",
                "uid": "80350711-ab40-4122-98b1-bf66fb9bda71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6338",
                "uid": "2f4ed59e-494f-4c1e-910b-0708b7d33502"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "6362",
                "uid": "d779188f-1c60-4aeb-a113-f96233958a91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:57Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1065",
                "uid": "e32be62f-08fc-45ed-94a6-42301574737b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3389",
                "uid": "bb76348e-d6ef-4d64-99c5-be5283d91658"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3391",
                "uid": "a894dee3-fe4e-4b21-bfcd-237917796baf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-node-tuning-operator",
                "resourceVersion": "3349",
                "uid": "cbf99ce1-ca90-48d3-b11f-649cd8298503"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6067",
                "uid": "05bb8798-1c61-428d-b6e3-14f0bc325427"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "4980",
                "uid": "dcde7895-6944-4d4e-a252-3a05b4b5b82a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6504",
                "uid": "6be1d9a4-c8af-4b2f-9d67-b11171d97829"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5101",
                "uid": "8ac1fe5e-7ec4-4935-85b9-cf20bd11bfd9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5719",
                "uid": "ebc907ea-5085-40dd-9992-3b4ef209c9cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5720",
                "uid": "e200d113-77f3-4d7b-9a4e-88f611239d0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "4959",
                "uid": "a801ae25-c059-4673-8b6d-13c9600629ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6213",
                "uid": "ab88522a-3204-4100-b040-59ac569d55d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5087",
                "uid": "12ad7285-d7f3-4090-a36c-3b53188717c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "5351",
                "uid": "7ad03603-b46b-48dd-bb9d-791c18acb020"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6162",
                "uid": "da8598a6-633c-4678-8c1c-e729d9162b08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6440",
                "uid": "1790287e-90e8-46d1-b4d0-eb860dcdac13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "6350",
                "uid": "3d5f5a33-d697-42de-aa39-597a1dd8c69b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:08Z",
                "name": "cluster-samples-operator",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1539",
                "uid": "804a1bb8-4a0a-4fac-ae5c-6fe4ed92a0f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:58:39Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "14696",
                "uid": "2857b66c-3240-4585-9a04-dea94c5dbe09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3461",
                "uid": "a87f84bd-d784-4aa9-bf85-e07cae7366f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3486",
                "uid": "52b5e5ff-d3c7-4723-9212-62735a4472ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-samples-operator",
                "resourceVersion": "3351",
                "uid": "74ec0739-58cc-48cb-85c4-979f8c03bce1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6086",
                "uid": "f03f516e-cdc5-47ce-911e-11d94fedfdc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4915",
                "uid": "6a015eca-e384-45d6-90ca-ffae47e222d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6507",
                "uid": "0416ec5c-2153-4256-a623-9efd586ec3ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5170",
                "uid": "3311e8dd-04af-4072-ad32-ef21519e9c59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5686",
                "uid": "5c8df913-3d5c-4e2b-a7a2-b7bcad2af89d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5620",
                "uid": "38d1e7f4-00d2-4a03-881e-5ca2598a3eb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "4975",
                "uid": "e90fece9-f1c9-4813-9c33-94cb84846a65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6112",
                "uid": "7cfc175e-ab13-445d-8eeb-e3911db4b7e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5188",
                "uid": "839c88b3-e938-4add-b238-5aa0751f3ae7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "5360",
                "uid": "bbab3bc1-347e-43b5-b3f1-4eeafab657bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6229",
                "uid": "86f22b7a-3476-4534-8d1d-adb452912189"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6426",
                "uid": "d2b6ab8c-1646-4264-ab12-5850fdb949b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "6392",
                "uid": "0f07c89f-5b6b-404d-9d98-8c7abaebaf2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:00Z",
                "name": "csi-snapshot-controller-leaderelection",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1146",
                "uid": "922d0239-e63d-4291-9fc3-ef5a337bb445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-leaderelection"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:08Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-role",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1523",
                "uid": "fe2795fb-1e81-4781-8745-82a5a859a4e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "csi-snapshot-controller-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:52Z",
                "name": "prometheus",
                "namespace": "openshift-cluster-storage-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "832",
                "uid": "30c6e048-d85e-427c-98e2-5f1b4cd3d544"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3484",
                "uid": "86794c26-fe4e-4afd-9297-fc0746551b94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3487",
                "uid": "7eb119de-e0e0-447d-899f-5c24b3f7b068"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-storage-operator",
                "resourceVersion": "3394",
                "uid": "29cc96d8-8ecb-4722-a17d-6e4e57f0ab8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6087",
                "uid": "ae1b1e3e-f255-4494-94fe-5df80cd5df57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4997",
                "uid": "74f9faf5-a0c7-49dd-99d8-04ddfc42308a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6519",
                "uid": "6a3594a4-7871-47ab-a553-a33c5233995d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5141",
                "uid": "02c45c25-0b25-4d52-9642-7a2543eaa49c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5687",
                "uid": "c3627cf4-5bb6-4a30-a652-856b481f10e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5772",
                "uid": "2a58bb7d-3d90-44f9-b9c2-74c3597c57ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "4833",
                "uid": "598fdc1a-dbad-4b81-b0a8-e51dfbe1ef59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6204",
                "uid": "835254f6-7f97-41aa-85cc-4d3567ebc18c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5147",
                "uid": "1ad2e7f9-f52e-49b8-a04f-d1ff682aecfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "5509",
                "uid": "0f1882ee-7e79-4e1a-8a51-979419c3cd72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6209",
                "uid": "ceb961fb-9f9b-4933-8ebb-9c6ddc337da3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6322",
                "uid": "3601cb31-52b3-4eec-8b45-8ac231dbad52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "6458",
                "uid": "465d69c9-0ff7-4808-8ebe-6ea24fd053fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "exclude.release.openshift.io/internal-openshift-hosted": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"exclude.release.openshift.io/internal-openshift-hosted\":\"true\",\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant Prometheus access to monitor the cluster-version operator's metrics.\"},\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-cluster-version\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"prometheus-k8s\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"openshift-monitoring\"}]}\n",
                    "kubernetes.io/description": "Grant Prometheus access to monitor the cluster-version operator's metrics."
                },
                "creationTimestamp": "2026-05-12T17:42:42Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "510",
                "uid": "20cc8d6f-3745-480b-8106-ebb5721081eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3488",
                "uid": "17ac9ad0-7853-4137-ba1e-52e4d2b9a341"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3489",
                "uid": "f4c5e563-b832-4183-9d28-83187c7c9777"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-cluster-version",
                "resourceVersion": "3393",
                "uid": "08a33b5b-c0d8-4d43-a104-2330dbc74d47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5972",
                "uid": "a1ad32a9-bb56-4a7f-ac6b-acde8d3977c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "4999",
                "uid": "b6787938-4f7c-4577-95d4-4c9f2dce8253"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6616",
                "uid": "9b3508c6-f351-44ec-952d-53dcfe533eea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5073",
                "uid": "3c826be6-707d-4b91-881b-8e913fed5742"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5630",
                "uid": "f0471f1e-81fc-41a9-bd6e-ea81350c0301"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5667",
                "uid": "ce67a134-a515-4991-87a9-8ba199ad6940"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "4875",
                "uid": "7784d217-7047-43e3-b422-a583f76dfd56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6145",
                "uid": "d173fe9c-6996-4b3c-a15e-b265727c4969"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5048",
                "uid": "349a6ab7-c618-436e-a7af-b48b1d010810"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "5256",
                "uid": "91e83fd3-c2c8-4c52-b1c7-da380a367a40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6266",
                "uid": "5dfb4e2a-a43f-4a58-a6f8-045f33f02e0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6361",
                "uid": "10dbb6aa-7d12-424d-bb65-9ab4e5fee4d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-managed",
                "resourceVersion": "6524",
                "uid": "f16a8bb3-0ca3-4a34-9833-2f54735a1893"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:54Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "910",
                "uid": "8ada1c9c-0aea-49cb-b02a-e68f3ab5e176"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-configmap-reader",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2599",
                "uid": "d271b685-3508-47ea-9095-7039576b5821"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-configmap-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-operator",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2581",
                "uid": "6c3d1e10-4ed6-411a-9ec8-7bbd39ba0816"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-public",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2583",
                "uid": "d37cba07-16e6-41eb-94df-e32ee5142344"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-public"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:11Z",
                "name": "insights-operator-etc-pki-entitlement",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1794",
                "uid": "975f6485-d352-44f9-8df3-7009998b6be4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-etc-pki-entitlement"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:56Z",
                "name": "machine-approver",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "956",
                "uid": "e7132603-9607-4964-905a-a93e4ea0de18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Grants access from any authenticated user to the openshift-network-features ConfigMap"
                },
                "creationTimestamp": "2026-05-12T17:43:54Z",
                "name": "openshift-network-public-role-binding",
                "namespace": "openshift-config-managed",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "4118",
                "uid": "8fa0ec92-8dfa-47ff-965e-9fa5fa63b1f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-network-public-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3507",
                "uid": "60908dd4-d01a-46e1-bbc5-f27ed374d218"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3508",
                "uid": "031696d3-29cf-41a0-914d-26aec05daa2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-managed",
                "resourceVersion": "3491",
                "uid": "ef78bdf1-5aa7-4cee-906d-ba63195c9d88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-managed"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:11Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:oauth-servercert-trust",
                "namespace": "openshift-config-managed",
                "resourceVersion": "1811",
                "uid": "ec2ac03b-d65e-4f5e-9e56-b1cb4fa24148"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:oauth-servercert-trust"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5944",
                "uid": "fd063105-6346-43bf-a10c-68d4086599d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "4950",
                "uid": "9f9536cf-1f16-4d4b-8abc-5c51b8ed74e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6571",
                "uid": "7c68e64f-d4d0-4eb7-bed7-d876737e41d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5105",
                "uid": "87fe1fb3-fad3-41bd-be0f-5d262ec34885"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5678",
                "uid": "564d5b44-7258-4e93-b225-2705c24ea179"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5629",
                "uid": "a29620f9-2cfa-475f-a4cb-be1f320078fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "4988",
                "uid": "16036b31-51fc-47c7-b531-e777fdb2044b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6124",
                "uid": "d24c3f4d-a534-4442-a135-e05089a20468"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5159",
                "uid": "f06827a4-541a-4dd5-a83d-5674291654b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "5281",
                "uid": "e226dea7-280a-4e0f-a522-4347e7055a1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6100",
                "uid": "6b3ae60e-90a2-4522-8089-016460299281"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6366",
                "uid": "5bb2fe30-0cff-4570-a19e-0b7afa36f883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config-operator",
                "resourceVersion": "6425",
                "uid": "5fa72de4-4588-4972-8264-bf138ed25eaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1666",
                "uid": "bfc44eae-2f5f-4d91-8b64-d2c0c28bb879"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3509",
                "uid": "fa9d18c6-f180-4a4b-95d5-5e5c60cc9ea0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3530",
                "uid": "b0abd1f1-8c95-400a-88d5-a24a285105c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config-operator",
                "resourceVersion": "3485",
                "uid": "31a4a0ec-4a55-4daf-be45-c4c48b708c54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-config",
                "resourceVersion": "6009",
                "uid": "c527cb5f-6c5f-4b31-b7ba-420070aa0c1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-config",
                "resourceVersion": "4890",
                "uid": "75270263-a6d3-4dcb-ac55-2e59848631ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-config",
                "resourceVersion": "6549",
                "uid": "eb128381-72b3-4982-be66-3985079850d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-config",
                "resourceVersion": "5186",
                "uid": "bb4feb84-19c9-4b9a-aa6e-5fd829c821fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-config",
                "resourceVersion": "5773",
                "uid": "7b192460-5d10-4167-9b09-2993afaa3fe3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-config",
                "resourceVersion": "5714",
                "uid": "b92b1fd9-33dc-428c-9f73-080acfe6f2d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-config",
                "resourceVersion": "4917",
                "uid": "2fdd69ac-03cb-4892-9259-88de41fc90f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-config",
                "resourceVersion": "6168",
                "uid": "e54e79b9-7357-4355-800f-84b776c16a75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-config",
                "resourceVersion": "5109",
                "uid": "d8ea5ee4-4704-4bd9-acce-a2457c72cd82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-config",
                "resourceVersion": "5515",
                "uid": "e1963194-4c9f-4b54-914c-710ccbf2637f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-config",
                "resourceVersion": "6265",
                "uid": "879ad3e4-8b67-4264-be0e-a13f588c9cf1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-config",
                "resourceVersion": "6357",
                "uid": "55d50a90-2f39-4946-8c9c-92f50925d1a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-config",
                "resourceVersion": "6393",
                "uid": "5aa11b40-7a6f-49a9-a678-737f3a81836a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:57Z",
                "name": "cloud-credential-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1029",
                "uid": "e8534a40-f88f-4ecb-b654-c8226d98d916"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "name": "cluster-samples-operator-openshift-config-secret-reader",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1687",
                "uid": "62707f16-02d5-447a-8571-676c540e2da5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "coreos-pull-secret-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2585",
                "uid": "f40f5d10-e29a-4536-ba5f-9345f99fe8e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "dedicated-admins-project-request",
                "namespace": "openshift-config",
                "resourceVersion": "5917",
                "uid": "b9262b89-b2a7-49bf-a43d-06946874e042"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-project-request"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "dedicated-admins-registry-cas-project",
                "namespace": "openshift-config",
                "resourceVersion": "5864",
                "uid": "7c6a65a6-0b42-4c62-ba55-4dc7c2868783"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-registry-cas-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:05Z",
                "name": "ingress-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1340",
                "uid": "98d4fc47-8f91-4de5-be09-29f4005dd935"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:09Z",
                "name": "insights-operator",
                "namespace": "openshift-config",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1555",
                "uid": "d55641e9-d71c-4993-814d-4a4736706baf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-config",
                "resourceVersion": "3504",
                "uid": "06bbb5e6-5199-42d7-8e84-afd3711bfd20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-config",
                "resourceVersion": "3506",
                "uid": "2e406603-8b93-48ef-afa7-9acab83a65ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-config",
                "resourceVersion": "3425",
                "uid": "aabbae70-b2d1-4c5b-9c6f-90259ec490f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6051",
                "uid": "3122c8ff-124b-4222-a419-bb4f8e681fa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5043",
                "uid": "3d6b736a-8224-4fe3-baff-3d286aa1f7ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6522",
                "uid": "7114d97a-4268-4163-8f05-10d261193bfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5047",
                "uid": "cb8563fe-64b4-4ea3-9b55-a4f17260c68d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5819",
                "uid": "1cf53247-1ac3-4f11-8c89-da981c088587"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5751",
                "uid": "d57189bf-acfb-492d-a8cd-81b67bf64639"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "4966",
                "uid": "33b908dc-744e-4ed9-bce7-46ab36aabaff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6152",
                "uid": "e4aa7d16-263b-4f74-b6eb-857fc6c46771"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5137",
                "uid": "59dce469-da6f-44b9-b032-addd55cd1327"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "5283",
                "uid": "a9015061-c143-4ddc-8072-2b4d81b28e74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6215",
                "uid": "4157db58-6635-4f72-b8aa-4f8030048e5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6267",
                "uid": "21c93bcb-ed07-4c65-93d0-269002de44ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-operator",
                "resourceVersion": "6427",
                "uid": "caad5067-3df4-4a47-8f28-c25f274dd8c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-operator",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2578",
                "uid": "c466aef6-2b6f-4b3e-a63c-d6ed80641649"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:36Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2503",
                "uid": "53821fd1-fdf2-4dca-99b1-297a6d55a348"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3529",
                "uid": "387070ce-9dda-49d5-bf1b-df38cd3b7d4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3548",
                "uid": "3d8e1e49-2f8a-4792-993e-226ce0449325"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-operator",
                "resourceVersion": "3511",
                "uid": "296ce253-a978-4e37-bdcc-20bfc1519ee6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6070",
                "uid": "3e906c51-0ce5-48d4-a9a9-5b99e55fa7e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "4892",
                "uid": "a8238b92-3cfe-40e1-823b-4ed09b0a8017"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6550",
                "uid": "d7db327f-c955-4556-8ce2-7789f60418b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5162",
                "uid": "ebc788b6-dbd2-4bcf-9c05-8381a360c0a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5722",
                "uid": "891194a2-7154-429d-bd41-b4d0b67bd740"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5636",
                "uid": "f1ffd9c1-cc02-40ad-b6d7-402404f946a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "4926",
                "uid": "2e549a79-74e0-41a6-ad88-c8c219417a93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6154",
                "uid": "6f6f34f4-4871-40c4-a09e-9ad3d6ba56c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5208",
                "uid": "b3ce5a91-e01c-4b6d-8e40-500a227d0802"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "5468",
                "uid": "e005a868-5385-4c22-9603-3bdae41ad208"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6125",
                "uid": "9a012364-9d36-4f5a-b600-46534c2f2503"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6428",
                "uid": "4f74b6b0-39f2-4f60-9e33-10b32651d5b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "6465",
                "uid": "20a98834-90ab-4f7e-96a4-06f2eaf9f209"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:37Z",
                "name": "console-user-settings-admin",
                "namespace": "openshift-console-user-settings",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2560",
                "uid": "d6a90e60-b72f-47e3-b319-39ee51dd7bee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-user-settings-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3554",
                "uid": "6cbccbd1-1226-490f-8707-078b99cb2228"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3547",
                "uid": "12cd236a-0d23-4a59-b00c-a48bd2e13235"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console-user-settings",
                "resourceVersion": "3510",
                "uid": "f3298e06-2fa6-4441-9a24-1ca7efaba7c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console-user-settings"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-console",
                "resourceVersion": "5916",
                "uid": "92aed020-71ce-460a-a56f-bdb3cc737a35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-console",
                "resourceVersion": "4879",
                "uid": "63a93a34-aa81-487e-b804-aef31d6e1aac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-console",
                "resourceVersion": "6619",
                "uid": "b1473740-35b2-4940-8d29-1c8c652a0a35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-console",
                "resourceVersion": "5192",
                "uid": "1b075663-2397-4995-9a53-b8a98c5101b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-console",
                "resourceVersion": "5784",
                "uid": "1c0fcb76-599e-4d46-b038-bc1e32bd0a59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-console",
                "resourceVersion": "5632",
                "uid": "0057a496-3a5f-4230-9072-0f6f82287dfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-console",
                "resourceVersion": "4921",
                "uid": "9dea0212-4dd2-4dff-9b94-0d050812c2d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-console",
                "resourceVersion": "6081",
                "uid": "0ba0cab2-76f1-4b09-b88d-7f0d8fdaf1ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-console",
                "resourceVersion": "5134",
                "uid": "835f4be1-1bd7-474c-aa98-c639bd69b482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-console",
                "resourceVersion": "5465",
                "uid": "d930ae4d-293c-4434-a5c2-c52eb4bb854c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-console",
                "resourceVersion": "6211",
                "uid": "9d9bc89a-ada4-459b-a943-fbaa6f1018d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-console",
                "resourceVersion": "6263",
                "uid": "f1b18c2c-4187-4188-b4bc-ebf91de736eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-console",
                "resourceVersion": "6364",
                "uid": "114f9785-8823-4dd7-bd14-74387869f48d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-operator",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2576",
                "uid": "d985d008-3caa-4f04-bdbb-50924a35e56a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:36Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2519",
                "uid": "700e2b98-664c-481c-9467-326899230982"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-console",
                "resourceVersion": "3527",
                "uid": "1335bb18-ba3a-4dd7-885b-1bf474d42eba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-console",
                "resourceVersion": "3553",
                "uid": "7181af2f-dc5d-4eb1-8087-9e5f04996c9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-console",
                "resourceVersion": "3505",
                "uid": "56a31807-89d3-45ad-b9ad-5688283003b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5867",
                "uid": "0553515d-aeb8-49a4-90a5-dae1297cff8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "4952",
                "uid": "e9c0e85b-717e-46fc-9f77-42f23c19fd84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6599",
                "uid": "300ccc6d-1bbc-4a7a-a5e8-8150bb0fd79c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5063",
                "uid": "e42452d0-20bb-42db-aa2a-022426460ffc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5755",
                "uid": "a023e367-0fc0-49ce-9687-e0bd19bb9b2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5639",
                "uid": "2cf3a624-8d5c-4684-b73b-8f16e36ba905"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "4928",
                "uid": "f7779743-6c6a-4e54-9f68-0e16282a6ba8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6214",
                "uid": "cddfd810-db28-488a-982b-00363688c007"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5071",
                "uid": "f170b281-c0b4-4204-80e6-25e2a48e4e75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "5469",
                "uid": "cdc72b0d-43c5-4158-9ad6-937a3ceddfef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6170",
                "uid": "12df9a5e-5800-4052-9fc6-9c53c6026d1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6431",
                "uid": "957ffe32-cbfc-4046-bcb5-475718ebcb31"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "6365",
                "uid": "161b0b89-e670-4728-9577-47c31c941246"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:49Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "729",
                "uid": "31aabf41-2e5a-494d-83df-7ff54ae2b3a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3556",
                "uid": "99922b43-2d9d-4672-8294-28d86822e207"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3568",
                "uid": "b4531f35-9424-4569-82d6-2d220c6e3faa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager-operator",
                "resourceVersion": "3526",
                "uid": "74012628-6497-4cba-a914-559d98a8c037"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5974",
                "uid": "6806babe-bab9-440d-80f8-4288ffddea1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "4903",
                "uid": "08825c6f-e6e9-42be-8a24-db00cc3cacbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6589",
                "uid": "4718d6b4-109c-4fc0-851d-b4a09ce74f0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5079",
                "uid": "5bc07dc4-cb07-4d97-a15e-4e0e83f8ae75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5681",
                "uid": "3c369a1c-e17d-4318-941b-4757d68eb6a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5609",
                "uid": "a3dfd719-8e27-41a9-a494-239a4db9b0bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "4889",
                "uid": "eb4c2ad2-a327-4291-b54b-7383fbdddfd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6126",
                "uid": "e84da7f6-4473-4727-8b56-09a83f5a1d2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5190",
                "uid": "cb9c2122-fe8b-45d2-a7f8-c18e20d6311a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "5512",
                "uid": "d382a19a-d9fb-44e4-8e06-8471f1d8f4fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6138",
                "uid": "e98bf646-0dc6-42a6-8f04-e68443d831a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6442",
                "uid": "051e7e0a-0b87-4191-a340-2f628c053437"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "6505",
                "uid": "2274eb61-645d-449f-96d3-0dc3ed44e90c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3555",
                "uid": "f1246d13-463e-4099-847d-f8bac2551a02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3550",
                "uid": "9012d565-170a-45ef-8cab-793af0c60494"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-controller-manager",
                "resourceVersion": "3551",
                "uid": "2495771d-9a3b-4a69-bb7d-e3d0c659f041"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5976",
                "uid": "3d2c0c3a-bcc0-4879-9d3b-eea99f8e560a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4907",
                "uid": "da7fb3d9-89b6-4dc1-a57d-d2e18bb48e94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6580",
                "uid": "0f249699-4a6c-40c1-b997-d37b034c6bc0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5075",
                "uid": "3b3661df-4ebd-4dcd-bc99-09bda8240c87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5735",
                "uid": "649ec374-034f-4799-b5d5-ca4566da8fcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5741",
                "uid": "3df0f081-5a75-450e-aab3-e12408a70295"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6552",
                "uid": "fae0ce4a-41d0-4741-b867-9a2d3c160138"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6118",
                "uid": "3f7b2cd9-c99f-4e8d-a85b-114bd80fdf78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5117",
                "uid": "0014c77a-bef7-40c2-9fc3-408af7d12bd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "5476",
                "uid": "ead0034e-f0ee-44c0-a3c2-33cd1690d713"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6153",
                "uid": "23bf5aab-36f7-4b68-b20d-ab6887593b8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6424",
                "uid": "75512953-77aa-4c5c-855c-47ecf46d5e9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6397",
                "uid": "ec4c3651-7059-40d6-8db5-e1e4b6be82ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "dedicated-admins-customer-monitoring-0",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6544",
                "uid": "70a40b9d-cf96-40bf-acef-dc7252d8bb12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "dedicated-admins-customer-monitoring-1",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "6547",
                "uid": "4b73233d-bb50-4930-bb48-a1ec54543a81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "dedicated-admins-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4834",
                "uid": "4929ffde-42c2-421a-8ffd-1f672e5ea2d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "prometheus-k8s-openshift-customer-monitoring",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4832",
                "uid": "126da666-3d2c-4524-8d08-a011d772e3c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-openshift-customer-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:deployers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4829",
                "uid": "8876ba56-5ed8-4155-9c78-a540ac8b02f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:image-builders",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4830",
                "uid": "31d54a64-8eac-4c62-9995-5776b7eb388c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "system:image-pullers",
                "namespace": "openshift-customer-monitoring",
                "resourceVersion": "4828",
                "uid": "4657824c-aad7-4dc8-b8ff-48f1b67963ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-customer-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:54:29Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c",
                        "uid": "22674212-651c-4381-a9bd-a8d032b78b37"
                    }
                ],
                "resourceVersion": "10282",
                "uid": "1f4631d3-12ea-42e6-85aa-a479555401c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "99b07c45bd4393a793940f31bf2887fd12a636d02cd8e5e017ce352a0db6d1c"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6016",
                "uid": "57cb6461-f249-4ad0-8378-9694ca97d2d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6649",
                "uid": "23df7014-b863-43ef-992e-ed3fd3fe9d3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6498",
                "uid": "995b8f4e-01fb-40d9-a3a1-6f7aee5231f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:17Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6719",
                "uid": "ae29e71f-6468-44d0-94c5-bfa7418ab1ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5640",
                "uid": "bf585e24-8d90-4c11-8118-9a4e1a8e6143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5622",
                "uid": "099e8132-c88e-43ba-8360-5c0fdb38a09b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6579",
                "uid": "040557c7-fd36-4d4f-963b-e1cffa62f1bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6188",
                "uid": "42f784cc-6222-4cb6-bd24-e0baf7fe91da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:12Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6637",
                "uid": "290d9219-d04e-49da-a8fd-e970fd4131e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:22Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6775",
                "uid": "37cb198c-11fc-4bd3-9e31-c25dbe3f4908"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6172",
                "uid": "6d57af2d-1e37-436f-8b63-a820a401a1d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6329",
                "uid": "addd8686-95d8-4fc7-b2fc-8b2614f586bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "6430",
                "uid": "12d20b89-6de9-422b-b1d4-3c49017d65a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:54:51Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.595-gbf89fe8",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "93kS0invRXyvjvhKUqw0RmNXHlq3DWDtSuHFzO",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-7rLkLi3Nk0YvyK9xTCUeUEoOvQKqfsPU8GLVFH",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                        "uid": "1942993e-c4f9-4a97-b959-76d24a0731a7"
                    }
                ],
                "resourceVersion": "10559",
                "uid": "5da81cef-11b0-43af-867e-36a6813ef1d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-op-7rLkLi3Nk0YvyK9xTCUeUEoOvQKqfsPU8GLVFH"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:54:49Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                "namespace": "openshift-deployment-validation-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "deployment-validation-operator.v0.1.595-gbf89fe8",
                        "uid": "46bbd140-479b-4153-be96-c0656a9e271a"
                    }
                ],
                "resourceVersion": "10432",
                "uid": "4e3d2615-d0ca-4ab9-bfd7-4a3d0b334969"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "deployment-validation-operator.v0.1.595-gbf89fe8"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "system:deployers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5233",
                "uid": "a893d30a-cd39-4ae7-9d86-42dfcfaa57b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "system:image-builders",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5246",
                "uid": "4046152b-7c85-4722-9ce4-4d10a9e5cb76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "system:image-pullers",
                "namespace": "openshift-deployment-validation-operator",
                "resourceVersion": "5232",
                "uid": "06abcbac-e166-49da-81db-99cba98ce59c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6071",
                "uid": "5adb954a-cefc-45f7-9a0e-8cefba179c90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "4896",
                "uid": "750a4e1f-71f4-4f9a-9be5-ace92170f3ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6499",
                "uid": "b2b8439a-b8d9-421a-97e2-43c1712486cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5128",
                "uid": "20c5bb72-f01b-470f-ad50-aa95bcf09000"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5701",
                "uid": "1469c4ce-fdb5-4887-9d3a-7e85aad9dac5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5744",
                "uid": "0ea03cd1-a044-4d70-986b-041e9c1fdb13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5003",
                "uid": "b2ca32cf-395d-447d-bc04-64d5169d2493"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6195",
                "uid": "e684d4d7-70bc-4af5-9545-e3e9144430e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5059",
                "uid": "bee37759-8b04-4d88-a058-eceec1853eb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "5460",
                "uid": "e88bdfe4-8b4e-4436-8215-35a3be012e89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6253",
                "uid": "653253ff-d5e9-4125-9aa9-002960ddabff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6324",
                "uid": "98b936e2-570f-4209-acdd-07433b94d139"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "6419",
                "uid": "86c686af-ca21-4622-a3a4-23a419394597"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:56Z",
                "name": "dns-operator",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "959",
                "uid": "feab45ce-8b01-426d-97f4-4811ed6919aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:55Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "941",
                "uid": "1c257950-4e28-4808-b3bb-4a812602231c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3571",
                "uid": "3ee91eb7-8512-4272-831f-e84b256a93d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3594",
                "uid": "020584b4-be52-4d86-aec9-ddd6736ad007"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns-operator",
                "resourceVersion": "3552",
                "uid": "d91e587b-7a59-4e3a-b7b8-658a0de4e537"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5888",
                "uid": "6ee1096d-bd66-48f2-bdfa-4be2b994571b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-dns",
                "resourceVersion": "4974",
                "uid": "bae21977-fdf3-4790-a282-50854408fe35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6553",
                "uid": "4db0741f-9257-4652-b031-e7f771e11b86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5125",
                "uid": "37e70a98-b01f-4a19-8834-b085500288cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5821",
                "uid": "da554cd4-cf9b-4aae-ae23-7c334652be8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5679",
                "uid": "76e3d698-2e14-4806-88c0-b36bf63c97f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-dns",
                "resourceVersion": "4969",
                "uid": "601792ad-146c-4db6-8026-a6b465ad42d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6190",
                "uid": "273c44d4-b52d-4ec3-9464-ce794f70f4ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-dns",
                "resourceVersion": "5139",
                "uid": "430fc3ca-1be0-490a-96af-3b47b35e5393"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-dns",
                "resourceVersion": "5344",
                "uid": "09f861d7-ff62-459e-94a9-6a0969249ea2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6192",
                "uid": "33ba8b60-4d15-49c5-ae65-567dd7392399"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-dns",
                "resourceVersion": "6455",
                "uid": "4ea6a3fe-7a76-43f3-b10d-bf180655ef4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-dns",
                "resourceVersion": "6506",
                "uid": "9558bc30-6e16-4cbd-843c-1ffda83df403"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "dedicated-admins-openshift-dns",
                "namespace": "openshift-dns",
                "resourceVersion": "5984",
                "uid": "7571cad0-2503-4066-9b4e-1b16c975c6eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-dns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-dns",
                "resourceVersion": "1715",
                "uid": "eedb01b5-f086-4e30-99bf-d3ad791b6098"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-dns",
                "resourceVersion": "3570",
                "uid": "e9d70f2a-f939-4866-9ecc-9a425ac80c02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-dns",
                "resourceVersion": "3587",
                "uid": "c44219b4-5838-4cc5-8d3a-b52891d966f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-dns",
                "resourceVersion": "3546",
                "uid": "b2d4fb63-b94b-46c1-a823-333665bb5647"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6055",
                "uid": "38ab5a71-d0fe-4899-ab0d-7a8d69c10272"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5031",
                "uid": "23b1d834-acb0-49d8-97f8-559fa962cb8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6525",
                "uid": "32a92869-08ed-4867-a186-0f808cdb0734"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5108",
                "uid": "b8d493fd-7fc7-43ea-9850-f10e5adab529"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5823",
                "uid": "d56edd3a-e146-44ec-82be-641e2d354203"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5745",
                "uid": "fd4fbdc8-7222-4b6d-98bb-062dbfc4247e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "4895",
                "uid": "f8de1685-bda4-40dc-b287-afe49e8cf37e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6216",
                "uid": "06906fc6-38b7-48ce-9352-633bb174ba34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "5050",
                "uid": "3922e77e-6773-4c2b-b9db-30445fb35b1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "5350",
                "uid": "53ae1e6d-c44b-4eee-824a-fd96af2dccf4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6128",
                "uid": "eb451cd6-5b1f-481f-86ea-db726cd4f0e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-etcd",
                "resourceVersion": "6370",
                "uid": "f9c8e4de-c59e-4752-bb12-58e4d17544ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-etcd",
                "resourceVersion": "6368",
                "uid": "2e14ba27-53a7-4bb1-b26c-ba55fcd299a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-etcd",
                "resourceVersion": "3592",
                "uid": "251fafef-a3e6-4e14-ba55-91cdd9e24b01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-etcd",
                "resourceVersion": "3593",
                "uid": "26228d13-33fe-4fef-ba28-cc13e16f3cee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-etcd",
                "resourceVersion": "3549",
                "uid": "2aff5c12-3eee-40a0-9f43-2500362cad6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-etcd"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:18Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "20100",
                "uid": "3d5f42fe-c0d4-4aa5-b9e0-f76a2815110f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:18Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "20111",
                "uid": "3909a581-6bb9-4abe-99aa-bcc52e7369c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:21Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "20299",
                "uid": "08de3493-512a-4914-9de4-a0b6ab403908"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "20722",
                "uid": "2c38dd8d-0f3d-429e-b9a7-ee7337bf6ad2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "20684",
                "uid": "20fd5dec-e769-43c0-a933-8164fce5ad32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "18730",
                "uid": "ee3b0bc3-9bf8-4a42-b4a4-4c230c81bd17"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:04Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "18828",
                "uid": "f627c9bc-b734-4e1e-a901-2f90ab50b5f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:10Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "19539",
                "uid": "6ea50afd-552a-4a60-971c-48651c963463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "19697",
                "uid": "bbf85840-b8a3-44c2-93e4-fcf638abaea7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:25Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "20598",
                "uid": "17de5857-1843-47ba-a509-a5b20f701cc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:32Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "20917",
                "uid": "efc194b6-c458-4015-94c5-78dd03c7d9c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:36Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-gitops",
                "resourceVersion": "21095",
                "uid": "f6e16f1f-8dc2-4b7c-8ae2-a70bb741d2a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:12Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-gitops",
                "resourceVersion": "19802",
                "uid": "3fc0cb03-5b42-4c7f-8451-c7e082602914"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:06Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-applicationset-controller",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "19058",
                "uid": "607ef853-258c-4045-b97e-d68440c7e6d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-applicationset-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:04Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-application-controller",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "18874",
                "uid": "39148962-eb54-4efc-87e3-b69e56725815"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:04Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-dex-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-dex-server",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "18836",
                "uid": "e1cfb14d-0c32-4e47-b556-315feaaa235d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-dex-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-dex-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:05Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-redis",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-redis",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "18921",
                "uid": "78f24ecd-7c65-4b3a-b5e4-8f62e8879124"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-redis"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-redis",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:04Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-redis-ha",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-redis-ha",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "18893",
                "uid": "d58f3953-5383-4300-bd43-212d197da529"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-redis-ha"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-redis-ha",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:04Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-argocd-server",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "18882",
                "uid": "a2e0a656-a4a7-4d1a-9cb4-aaf3e26eec15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "name": "openshift-gitops-prometheus-k8s-read-binding",
                "namespace": "openshift-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "openshift-gitops",
                        "uid": "42dc88e9-8f1d-4e59-948f-cd0d8ffec458"
                    }
                ],
                "resourceVersion": "18738",
                "uid": "e23dc91e-8a68-4b5f-9f00-b21b48532999"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "name": "system:deployers",
                "namespace": "openshift-gitops",
                "resourceVersion": "18729",
                "uid": "073e3df7-8442-47b9-aa49-353118d1d578"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "name": "system:image-builders",
                "namespace": "openshift-gitops",
                "resourceVersion": "18709",
                "uid": "60b8481d-e4c8-40bc-a445-04b9d740f430"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "name": "system:image-pullers",
                "namespace": "openshift-gitops",
                "resourceVersion": "18728",
                "uid": "f6463f9e-1a9f-4acf-bd67-6a2ac78d1568"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6017",
                "uid": "ed3538c5-d395-4f57-a66e-acc0214ede5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "4960",
                "uid": "9a873a29-3450-4555-8349-4e8775e57418"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6535",
                "uid": "4fbfe732-81c9-4c82-a994-3b7c3f994a91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5094",
                "uid": "63362e9e-c78a-47a4-90c6-17961bd0fc41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5643",
                "uid": "fd1468c9-3aef-47e5-b7b8-b29eb5d23790"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5642",
                "uid": "93a5db85-25eb-41fe-8ca4-b734ab8a5978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "4791",
                "uid": "0df51885-c072-4a9f-b146-5860a0c49d90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6084",
                "uid": "47f28ba5-6862-440a-9ef8-56a8285dbcf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "5169",
                "uid": "b54f9f5d-18a3-4824-bf50-ab055725a61d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "5428",
                "uid": "2590e8e2-12eb-4e63-b153-fd64b2363504"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6269",
                "uid": "19be8910-9aaf-4d30-bcf0-12e408c0fbb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-host-network",
                "resourceVersion": "6433",
                "uid": "3b484888-9cdf-4b12-b470-cd0a5486672b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-host-network",
                "resourceVersion": "6475",
                "uid": "429b869a-a5b4-42d6-a12b-6181a4a6c0b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3585",
                "uid": "e53acdba-4998-4273-885a-d1d3532b0dcf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-builders",
                "namespace": "openshift-host-network",
                "resourceVersion": "3590",
                "uid": "cc024a6e-f7d2-449f-be43-39980d780afb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-host-network",
                "resourceVersion": "3572",
                "uid": "96980ad8-1ab7-459d-942d-474f38694c19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-host-network"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6073",
                "uid": "067ce9f0-9973-4469-be90-af8ae0198533"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "4924",
                "uid": "733cb8ff-49ef-4262-8bd2-0d01fac5378b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6555",
                "uid": "fb74acfd-d1bc-470a-9cbf-1234dba85d71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5144",
                "uid": "68d45cde-6c78-4326-b261-9dbff6b2e5b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5826",
                "uid": "fcc52e54-165d-4306-b046-f3da67658b50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5721",
                "uid": "a169edd2-c44c-49c9-97de-a694a8c05c12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "4992",
                "uid": "d28a1508-3373-4fd1-939a-27aaeed2aa77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6107",
                "uid": "994999c0-c88b-449c-b9ce-09894a492a82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5191",
                "uid": "52a6b115-e3d8-4c95-9387-fa27bca5fedc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "5478",
                "uid": "47672747-0609-40a2-87e8-664f6db9e219"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6102",
                "uid": "c3062060-8f23-42e3-81ec-1f0f89e490a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6373",
                "uid": "5b9b7762-6dc6-40f7-9fdd-9f4652100aaa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-image-registry",
                "resourceVersion": "6526",
                "uid": "580e3c7a-6c2b-483e-bf69-473637ccc82f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:08Z",
                "name": "cluster-image-registry-operator",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1543",
                "uid": "8e07d1b2-08ba-41a3-aa47-fc4b07a0fe1d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "name": "node-ca",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1697",
                "uid": "4433deea-6db8-4117-b532-7b05e9f776a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "node-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-ca",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:53Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-image-registry",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "861",
                "uid": "67f5b54f-280d-4d7d-a997-df71bb975d9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:deployers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3588",
                "uid": "f4350261-2cbb-4755-a102-716ebac698bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3632",
                "uid": "85f03eb3-eac1-438c-965d-bd6dc9c94349"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-image-registry",
                "resourceVersion": "3612",
                "uid": "82280694-2fe5-4047-a53c-27d547b924a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5904",
                "uid": "df1102b3-66e3-466e-991f-30a1510cf319"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-infra",
                "resourceVersion": "4927",
                "uid": "51a4e838-7a9f-4d6a-948f-9f0b3fcdc508"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6528",
                "uid": "55fb785a-4540-403f-8ba4-f81ebdd4e94f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5146",
                "uid": "55df508a-bcb9-4a68-99a5-0ba02fa3fc21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5709",
                "uid": "7ddbb34d-1982-4477-87d8-023527b3abb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5680",
                "uid": "80921add-fd67-4770-a893-a2fc6d70131b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-infra",
                "resourceVersion": "4923",
                "uid": "784890e1-707d-43f2-a3b5-8beea51ae4bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6094",
                "uid": "77af851d-da8c-46f9-9924-1118bdd174c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-infra",
                "resourceVersion": "5089",
                "uid": "92c19a4a-e92f-43ef-9d17-9f30167ed7d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-infra",
                "resourceVersion": "5383",
                "uid": "0a23160f-780e-44a5-9121-688bb42aabe8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6184",
                "uid": "9d40f441-8559-43c8-bfd1-692f30f1a18e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-infra",
                "resourceVersion": "6339",
                "uid": "dbe5d314-8694-4dda-84cd-bbca6877434d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-infra",
                "resourceVersion": "6477",
                "uid": "e061b34c-f489-48f7-8d79-2847ea195bf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-infra",
                "resourceVersion": "3631",
                "uid": "f14cb053-8f4b-41c5-bcd6-746858d7fd34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-infra",
                "resourceVersion": "3666",
                "uid": "f66a739d-41e9-4b31-b294-f0d4c588a172"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-infra",
                "resourceVersion": "3586",
                "uid": "a520dce3-88dc-43bc-863b-4288df3b30e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5966",
                "uid": "19aeb585-fae5-4ff7-832d-f0d08628313f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "4882",
                "uid": "0cf0fec2-770a-4812-9241-53794d8491c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6530",
                "uid": "72cefe21-87ab-4701-82a2-0a60ce1aa8eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5097",
                "uid": "76da8ccc-619d-464e-8b70-c2193cdc9af1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5739",
                "uid": "a8c497b5-4786-415f-80db-0b80c99cdf52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5704",
                "uid": "01470633-7d3a-4d24-81f0-e9ac7a7c637b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "4908",
                "uid": "4dcfb099-7471-42c7-b40f-ec4583dae27c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6088",
                "uid": "269476a5-8109-4816-a954-06d1ac3b2449"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5096",
                "uid": "d8571c79-5475-4c63-a9a9-c175b21466f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "5261",
                "uid": "6d742a22-9f16-42b6-9723-6f5b2276a4d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6108",
                "uid": "77abd67c-a05e-4bcd-ac4f-e644f169bc5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6404",
                "uid": "7a0d0d11-39f6-4ad8-83ca-a17ae2a87215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "6369",
                "uid": "a1940028-bbf7-40af-bafc-e49f2290a589"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3672",
                "uid": "4ffa6912-e972-4b85-b983-c50b63f42d20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3667",
                "uid": "9cdc1510-467e-4f14-b15a-d3d84f052208"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-canary",
                "resourceVersion": "3589",
                "uid": "dcc1dbc7-cdc0-460a-9c23-d1957f92e68a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-canary"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5892",
                "uid": "0f670811-311f-4ebc-8e4c-72e2fee1526f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "4965",
                "uid": "c9454aca-65c2-4f0e-a510-c34ea44291d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6591",
                "uid": "4f69f63d-3bd3-4562-bddc-ed0b3cda70bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5189",
                "uid": "673fa98e-6b47-4859-bb6e-2d211e3cfca7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5647",
                "uid": "cba02429-5b15-4719-8b1d-9687e038b1a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5671",
                "uid": "a750cc5b-fe3f-465a-87e5-f70b4c341500"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "4798",
                "uid": "cdd5a262-ee03-494b-8467-1783d9f24a3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6069",
                "uid": "41941ea4-b8e5-4489-9d71-5d3a052fec85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5130",
                "uid": "0f8a0787-de48-4791-97fc-4918395a4a5b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "5291",
                "uid": "acde1386-a379-4f5d-8a2a-8953b44c1b39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6110",
                "uid": "496569d8-2903-438e-8bee-b277babdffe0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6376",
                "uid": "0cfa0c0c-84ac-45fe-b0e2-340348219647"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "6461",
                "uid": "842fc197-ad3e-4d76-bc96-98e55bb838e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:04Z",
                "name": "ingress-operator",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1311",
                "uid": "3b0649a2-9734-4d17-bf7a-0c67133c444f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:27Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2260",
                "uid": "c9221103-4056-437a-99c9-5e98fe53d88b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3674",
                "uid": "5b42de01-d8a3-474f-94d3-143865f85827"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3650",
                "uid": "4694445b-402a-4697-a008-f2a1d65365c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress-operator",
                "resourceVersion": "3630",
                "uid": "ea4cd990-409c-4e36-82a1-1b41b8cf9544"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6000",
                "uid": "8a88452b-351a-40dc-a3ec-39a972e266fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "4929",
                "uid": "3f1a9ef6-2b3c-41df-893d-af6722976d2a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6620",
                "uid": "4476ca81-79f1-4606-a0ea-fb9caef23986"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5110",
                "uid": "ea1e6ae2-8b16-454e-858b-71eb26f47cfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5666",
                "uid": "e8c4d978-bb89-455c-bac7-186e5863eb54"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5753",
                "uid": "a5e0d282-37d5-427f-8a96-5e06a57126d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "4961",
                "uid": "ba4b6a38-06c6-476d-9782-dc276b9b3c28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6238",
                "uid": "36849212-4a90-449d-bb45-ca027883276c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "5111",
                "uid": "2f9352ed-314a-4f5a-bd68-10f2dc5371ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "5449",
                "uid": "b83ff8c3-ff28-4119-8552-8a758af34e89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6217",
                "uid": "4eebecf8-6be9-4f7f-b831-5a2ca1bdc931"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ingress",
                "resourceVersion": "6342",
                "uid": "ad45942c-6bdf-4db9-b25c-4b2687fc969e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ingress",
                "resourceVersion": "6443",
                "uid": "cac3500f-da2f-4dc7-9041-de22903a2a4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:25Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ingress",
                "resourceVersion": "2236",
                "uid": "0e689a20-337c-494e-9f11-70e3eec7dd10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3611",
                "uid": "caadc617-82f0-4cfc-a089-6df47c9d04eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-ingress",
                "resourceVersion": "3649",
                "uid": "355986cc-57be-40ed-8992-dc70c1b13a74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:48Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ingress",
                "resourceVersion": "3591",
                "uid": "5a052688-a565-474b-a037-107e2acc7985"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5854",
                "uid": "b4d65473-f2bc-4c1c-954e-ad4ecd455f23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-insights",
                "resourceVersion": "4904",
                "uid": "a16c4181-669b-4679-9c31-4cd04d4989b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6613",
                "uid": "3f10afa5-02ac-490e-bf07-80216ea2d87b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5082",
                "uid": "334fcaad-a4a1-4335-b915-85217fac3b5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5765",
                "uid": "4da13d48-2c88-4cde-9fde-e26e252084cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5644",
                "uid": "34ecce36-e50a-4634-bc50-a41744ba8e12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5006",
                "uid": "a939275e-432d-4ec4-884d-03bec2bead08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6109",
                "uid": "18321989-628b-4990-ac52-925ceb07e41e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-insights",
                "resourceVersion": "5193",
                "uid": "7711f421-2af4-4a1d-badf-2e98c0a64c24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-insights",
                "resourceVersion": "5353",
                "uid": "7accb65b-1396-4ccf-8ff6-a107d1586030"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6274",
                "uid": "57044505-7f6d-4848-9bcc-bff9db8b4d94"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-insights",
                "resourceVersion": "6332",
                "uid": "9f13bd9a-8fac-41f8-b875-e36e5e2d1754"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-insights",
                "resourceVersion": "6432",
                "uid": "1e7feb35-0b31-4f7f-9e1a-1d3eec43445c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "name": "insights-operator",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1640",
                "uid": "46d62932-997a-42f7-b5aa-37f94592c8bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "name": "insights-operator-obfuscation-secret",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1713",
                "uid": "c7f23b6a-77dd-4fcb-b02e-867b0b9ecc76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "insights-operator-obfuscation-secret"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:13Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-insights",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1928",
                "uid": "23fd29f5-d7d2-437c-956a-05ce34df7413"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-insights",
                "resourceVersion": "3670",
                "uid": "5defc5ce-bccc-4e75-aaba-e38426a7bfd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-insights",
                "resourceVersion": "3671",
                "uid": "92730196-493f-4015-b7c9-5488bf1f69f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-insights",
                "resourceVersion": "3663",
                "uid": "974e7ca3-3e52-4fd3-95b9-f5d931bec4b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5994",
                "uid": "5894b787-5b17-4f34-8aa2-6ce03d32bf7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "4933",
                "uid": "cafa6a5c-c2a5-40dc-ac03-a0c69efe3edd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6600",
                "uid": "a5691cf5-2f48-431b-bdc4-921486106ae6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5083",
                "uid": "e824422b-75a9-4f20-80e8-6b2b4893729f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5651",
                "uid": "dfc9a888-8e4b-4581-9ef9-3d2dd79ef9d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5612",
                "uid": "01cfaca2-c8dc-45fa-aae6-e70cc3534a7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "4940",
                "uid": "25e1b0d2-87c3-47e4-b4ea-cfb849cf5086"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6252",
                "uid": "13f2e6d8-6da3-4abd-916a-9bd794377682"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5131",
                "uid": "3a5aaec2-c270-43c7-af21-a5ed19d1f040"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "5389",
                "uid": "c8b471a0-0486-4f27-b8d6-220bc6f3e090"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6194",
                "uid": "0cfe7986-5b4d-4f51-992f-ceba8bca0d46"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6276",
                "uid": "69a20b5e-5806-454d-881a-72093f1af32d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "6375",
                "uid": "5a75199b-f562-4162-a773-895d482e7c28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:26Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2256",
                "uid": "6be12a48-5928-4b8b-88b4-e50c6fc6e273"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3664",
                "uid": "76da32f8-26f3-4daa-abac-ee93194fff4e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3692",
                "uid": "091a02e9-e6be-4f42-88d2-612db2817073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver-operator",
                "resourceVersion": "3665",
                "uid": "b205609f-161b-4a44-aa38-41cbdff22cfe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6002",
                "uid": "046164fb-a2b2-4bc3-9f84-6f4fd7e9d5d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "4930",
                "uid": "3470354b-7f38-454b-a276-8c8e9e96d0cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6563",
                "uid": "2798cbba-5b08-45eb-a210-6af353272656"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5210",
                "uid": "944b7691-33eb-4210-82ed-f10b0ada3b6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5742",
                "uid": "5e9da45a-d1c3-4197-80ce-e8fa8bd263cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5693",
                "uid": "e8dfc739-39c1-4e8f-a1b8-597397ea0092"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "4996",
                "uid": "5e05e160-8aa6-4111-85eb-ac95472f21bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6233",
                "uid": "4f7221df-78f2-4f12-83cc-f269cd069a72"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5098",
                "uid": "be7d171d-46f4-43b5-990d-6a9779966fe9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "5398",
                "uid": "9eee752b-a77e-4175-aaa4-d4f226be75a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6115",
                "uid": "b7864234-1b10-4336-9199-258575c131d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6345",
                "uid": "83c55987-349c-4998-bec5-f832e44e39aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "6509",
                "uid": "a00549e0-a07f-4833-a7a3-9d662df5e623"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3673",
                "uid": "57ac002f-f554-44d8-85b0-006aa263f75f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3691",
                "uid": "f5e13b23-00b6-4483-8cfa-c9b9cdd8662e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-apiserver",
                "resourceVersion": "3648",
                "uid": "7bcf1a7b-f375-4a4d-8f5e-fc54ab26edea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-apiserver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6020",
                "uid": "b260a942-00c8-4ab3-92c4-9a4010477299"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "4919",
                "uid": "b2e9a9d3-ddf0-4acb-8931-b8ad752e743f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6592",
                "uid": "d405015f-7598-45a3-a6ea-2311dc22878f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5132",
                "uid": "5e593f2c-0f6e-4030-bc7d-50f235ea0aa4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5703",
                "uid": "a7eb3709-14de-4e3d-98f2-cd815df8855f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5764",
                "uid": "91a29cce-9ba7-4f4e-aee3-c44d2cf01bef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5008",
                "uid": "1d98adde-15dd-4e9a-938c-fcee61c4d57b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6072",
                "uid": "1e34c7e3-4174-4dd3-918d-4be50249cae1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5124",
                "uid": "99097ab7-ea57-46b1-9216-c4f258ff02e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "5341",
                "uid": "d1ae1e9b-a63e-4a61-82f7-c9097c552bd3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6140",
                "uid": "ead15b69-0ea8-48bf-a9df-6e8fd30cd645"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6288",
                "uid": "50cf61f7-d368-428f-b361-28edc139708e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "6435",
                "uid": "201dde0b-b5b5-481d-adf9-8ada0af60122"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:50Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "737",
                "uid": "8336f543-3d42-46b5-a115-8fd3ea90f624"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3732",
                "uid": "134a4efd-6e2e-408a-ba6c-39b30c101d99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3711",
                "uid": "466ff764-c8e3-46cc-90cc-a800e07efb4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager-operator",
                "resourceVersion": "3669",
                "uid": "9aad3e81-442f-4ab5-8cbc-dcd12282295b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6080",
                "uid": "7a8e7ac1-3499-457f-9486-38d53105d314"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:57Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "4916",
                "uid": "aed3ee25-90da-401b-9ab2-d126fa94eb57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6543",
                "uid": "a1f02d8b-443b-478d-9a9c-3a8c874ee76a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5066",
                "uid": "d0bc7b89-8cbd-438e-9794-26ec5a967767"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5682",
                "uid": "f6207f5f-a378-48b0-807b-449f0c0c0c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5614",
                "uid": "b6ad2f84-7210-4880-b5dd-6a7fed9fa07c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "4948",
                "uid": "dd9aa6ed-0020-433e-a54a-dae4d19b2028"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6127",
                "uid": "d2c9e9f9-d480-46fa-9dfd-f1750be204a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5121",
                "uid": "c85069d7-85f4-4f04-a64a-df1310dc8e0c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "5462",
                "uid": "eb314139-fb2b-45e5-af7c-f8d9233d689c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6277",
                "uid": "5890488a-e6a7-44de-b7a4-02cfb4f03900"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6347",
                "uid": "3597f617-f495-434d-8119-476453becff5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "6511",
                "uid": "fe4ed01a-8f06-4678-8244-44fff98a5555"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:11Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-controller-manager",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1839",
                "uid": "cbd5c1b1-c2bd-4013-a08a-3b51bba6f1e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3736",
                "uid": "e3207727-fd9c-48ef-ad0d-b83ac630db0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3713",
                "uid": "f93b5041-3a4b-4761-92f6-77ed394b9143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-controller-manager",
                "resourceVersion": "3668",
                "uid": "2b27ea28-76eb-4b82-9bce-cf36f88bfd90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5981",
                "uid": "0fcfaaa4-8ab7-41d2-93fa-c6b84ad44f45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "4982",
                "uid": "62fa8ba3-9834-487c-86ad-5c0e4bbd1b53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6566",
                "uid": "620ba43f-4ce0-433e-9677-2f7278e8cc22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5113",
                "uid": "24b43772-76c1-4f04-ab92-c658e8c17ae8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5774",
                "uid": "3b2bcf85-a80c-4e55-8cc0-2b0e1c9761bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5732",
                "uid": "adfcdb1f-97e6-4bbf-aed2-42c1fa8de1e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "4943",
                "uid": "a380c129-4c04-4a78-ac96-fdea7e4b0d59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6254",
                "uid": "e1b64645-d4b6-423a-ab5d-26cb30ba1d16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5102",
                "uid": "ae47a55b-355a-4c5d-addc-a0f55d91b400"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "5464",
                "uid": "2f9f60c6-ce31-4a38-af4e-506fccb22940"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6117",
                "uid": "1b6ed8fc-32b6-46fa-aca6-fc4b129b1b0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6326",
                "uid": "5f421060-d947-4cb7-96af-8fce2a2e7548"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "6355",
                "uid": "bf2b95f2-6954-493b-a1cd-0288072b253f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:49Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "716",
                "uid": "b44a3968-165c-486e-bff1-95bc8b36a5b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3733",
                "uid": "56154e35-38e8-40e8-bc56-f82536c77484"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3750",
                "uid": "b50fde37-6df4-4dbb-a3cd-68f9eb72aec8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler-operator",
                "resourceVersion": "3730",
                "uid": "a29bd147-ebac-49e9-a567-d3689099af95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5947",
                "uid": "5c6178cc-4ab1-49c4-b907-3f51d2c47106"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "4920",
                "uid": "9b3a1d85-3a62-4fe1-be0c-bf76f2206d21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6565",
                "uid": "3807f978-1749-40c9-a4c8-9dd81a74370b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5149",
                "uid": "d39c9c43-5260-4243-bbe0-8439ddc118ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5806",
                "uid": "c0907d45-cae6-4beb-bc7a-07e992abcd15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5646",
                "uid": "00c7ffa7-ce81-4ad9-963f-0dfcc5b7a45f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "4877",
                "uid": "ed284744-c33b-42ee-b940-2627a1a2510f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6207",
                "uid": "11592be5-4c2c-48b0-af79-6b5bbaf41901"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5090",
                "uid": "f5e73822-d71f-4b08-ba74-cba8ca1b043e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "5354",
                "uid": "675eddf4-e075-4255-8029-3908ff0c4a3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6174",
                "uid": "4a279fe8-e17e-43f4-b177-b9c78878f1eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6294",
                "uid": "48f283dd-2c31-443c-8f15-94de8f9618cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "6503",
                "uid": "6fe88422-2f7a-46d3-9ba1-ce726c5f5694"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3712",
                "uid": "bbf05162-5d33-4633-8646-20b60180b664"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3735",
                "uid": "8dd1763a-2fb3-46f2-b043-84e776ad782e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-scheduler",
                "resourceVersion": "3690",
                "uid": "2691fb21-ead3-4b41-a328-129790561451"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5919",
                "uid": "2d2bf961-0470-4bf3-aae1-d7e31f9592a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5045",
                "uid": "9d83662c-22bf-4537-98a1-808a3f6722fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6609",
                "uid": "0732fe93-d231-4db6-b256-cdedb9e299f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5086",
                "uid": "c34ca807-3490-477f-8914-5f948f902c96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5705",
                "uid": "82bcbf0a-89cd-4432-96a6-da1f547ee5ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5775",
                "uid": "26e02c05-c5eb-4c50-ad78-5a2f10f60bb0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "4945",
                "uid": "c0e7f041-30b5-4ebc-ab1b-1935bacdc2da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6099",
                "uid": "46364594-d238-4e20-8787-51c31bed7802"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5148",
                "uid": "c5828492-98f5-4902-aac2-908e68c8a935"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "5355",
                "uid": "84d54a2a-d45d-4556-8dc7-9071d6937d20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6187",
                "uid": "7171fa99-3368-4e96-b119-5fe44fed1777"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6314",
                "uid": "ce1a132a-6364-44d1-83b7-61969ad1e93a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "6403",
                "uid": "c66f9362-da81-4d27-a58a-3351d419d157"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3734",
                "uid": "b99659f8-4375-4fcc-94ca-cce1fe5e97eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3752",
                "uid": "cb6d98bb-7d5b-4e8a-938f-b15bdf08de60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator-operator",
                "resourceVersion": "3714",
                "uid": "b214b1b3-3db5-46c9-a527-8f90253ee03a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:06Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11809",
                "uid": "35f9e721-5aa8-4bdb-8d6e-68e6ec246fa5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:46Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11474",
                "uid": "81bdaaca-fc5e-4373-86df-32685b9d5b18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:48Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11534",
                "uid": "5e913f66-88bc-401b-a424-12ccfd461a51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11979",
                "uid": "97153f1d-eaca-4292-b4ea-dfa89da236d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:01Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11765",
                "uid": "f265f879-6c61-47ef-8e72-0a56f7824ffb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:04Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11797",
                "uid": "85128099-2f06-4d55-ba06-3aff3d8ca00f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:42Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11287",
                "uid": "07fd368d-3184-4db9-ad36-9cee4768f2de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:01Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11767",
                "uid": "cfd918d8-9bd9-477f-8a53-eed59dd58196"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:52Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11618",
                "uid": "7d4cbe30-5d43-4a30-b22b-6e13f589670a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:42Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11340",
                "uid": "ef4731ae-5bba-426e-8946-bb4153e368bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:53Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11621",
                "uid": "573c31b4-6e2a-40d7-a102-c1bd6a8471f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:17Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "12309",
                "uid": "d345f624-04e8-4cc9-a112-aa2ff0ddb639"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:11Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "12058",
                "uid": "aae2d016-438f-427f-aa21-0175c76dd7d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:56:42Z",
                "name": "system:deployers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11334",
                "uid": "18b61dcc-f3b0-43f8-9c08-ea8b8f9ba5b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:56:42Z",
                "name": "system:image-builders",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11339",
                "uid": "d5096f3e-9b62-4fb7-9f1d-71c7d92ae6a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:56:42Z",
                "name": "system:image-pullers",
                "namespace": "openshift-kube-storage-version-migrator",
                "resourceVersion": "11333",
                "uid": "9eb4509d-b976-4898-a6c6-8871ab4e40a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "5895",
                "uid": "56c0daaf-e8f5-48f6-838e-3beb596978ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "5898",
                "uid": "9d010a13-1839-4489-8bf6-738e0fde1362"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6839",
                "uid": "7675f321-485e-46bd-98c7-f498fa89f0ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6652",
                "uid": "08c1b2d1-6ec4-48fd-bb07-9130f53e3fd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6510",
                "uid": "44991573-a43b-450b-8833-6db127432101"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:18Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6732",
                "uid": "7479bba8-b8e4-483e-8b3d-ae15d725aab0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6825",
                "uid": "247b3d96-76f9-4734-a732-faec683e047e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6780",
                "uid": "4463909c-1b34-4521-98f5-23a341e31600"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6554",
                "uid": "cf0c0258-2b55-453d-a31e-35454e70faf9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6147",
                "uid": "387863ef-36e0-4df5-b836-6f399988ea06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6631",
                "uid": "3d8b66a6-7db2-4184-b8c4-f20720c78501"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:27Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6806",
                "uid": "d692d1b6-8f1f-490f-bdfa-8c650c5b71e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6165",
                "uid": "dcf9cc93-4f1e-41a7-ae81-b83f21815b7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-logging",
                "resourceVersion": "6270",
                "uid": "ae5b5a08-c0c2-4203-961e-8293614c7629"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-logging",
                "resourceVersion": "6485",
                "uid": "fb7bb6e7-aac5-4242-a880-8f9170d348cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "openshift-logging-dedicated-admins",
                "namespace": "openshift-logging",
                "resourceVersion": "5902",
                "uid": "a9dfb40b-498a-42a1-9b3c-2ccf4713e6d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "openshift-logging:serviceaccounts:dedicated-admin",
                "namespace": "openshift-logging",
                "resourceVersion": "5905",
                "uid": "2e4931e8-ef3f-49cc-b10e-5a14bf8625b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "system:deployers",
                "namespace": "openshift-logging",
                "resourceVersion": "5887",
                "uid": "4dca1951-edbd-4ba3-aad1-374d13898700"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "system:image-builders",
                "namespace": "openshift-logging",
                "resourceVersion": "5891",
                "uid": "d9fc4175-416b-4277-bf68-0c62f5acf0dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "system:image-pullers",
                "namespace": "openshift-logging",
                "resourceVersion": "5886",
                "uid": "8052d89c-031d-4c59-8932-45e672cd557f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5907",
                "uid": "d912ceae-50a8-404c-b07e-cd7a215f19d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4987",
                "uid": "7f2198a6-de9a-40ef-b690-38a4da6fa5d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:05Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6557",
                "uid": "0bf979dc-2aa6-4971-bbc5-4d4cb204d2d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5164",
                "uid": "b4719355-d33f-4749-ac90-632d3ba16202"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5653",
                "uid": "518fdfa3-85cb-4249-95df-703bda3f30dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5623",
                "uid": "57bb9b14-37a3-46a9-96d3-4d20e1351b05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "4977",
                "uid": "9fa932cc-d1ca-4bf0-9e66-37ce4e602a7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6155",
                "uid": "8ce4f922-1fb6-4095-8f00-a360480dfe2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5171",
                "uid": "d13d1adf-9376-4782-b1cb-7320b8ad0537"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:17Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "5452",
                "uid": "ade0f425-aaf7-48cc-be8e-73ac2580fee2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6255",
                "uid": "8ebd2b95-11a5-4691-b81f-84409edfbdca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6319",
                "uid": "92245859-c58f-4e37-b566-a543d79792ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-api",
                "resourceVersion": "6529",
                "uid": "d93358dc-0a77-4845-98ed-373baf481b63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:00Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1139",
                "uid": "66dce022-2d59-4444-919d-79ff1df5f105"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:51Z",
                "name": "cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "787",
                "uid": "7c4924d0-0de8-4c1d-a5f6-a0219c8776ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:00Z",
                "name": "prometheus-k8s-cluster-autoscaler-operator",
                "namespace": "openshift-machine-api",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1152",
                "uid": "b0719e12-a3fb-4704-a38f-1073d7b15bb8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3775",
                "uid": "65448f66-66cd-4172-b40e-da20e8819e0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3773",
                "uid": "3fdc9bbf-684c-4fb8-aa0d-b7dd6c8120ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-api",
                "resourceVersion": "3729",
                "uid": "0253c137-3bec-4274-a25a-9691e35edf06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5941",
                "uid": "c2304001-2397-4b51-96cf-a55baf055647"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4953",
                "uid": "51404a2d-9cab-47ef-9d47-63277a661b51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:07Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6595",
                "uid": "f76f2bcc-1e36-40e0-beba-99a2c3fc97fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5152",
                "uid": "270b581c-9821-46f6-bd69-9afabbf0d7bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5631",
                "uid": "2cc858f0-0b56-4a81-acad-a9094b9265e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5779",
                "uid": "a755f360-34e0-4e88-9af0-071f70b5d76f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "4998",
                "uid": "c8752846-3a2e-4f94-a159-3ef93d6482a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6101",
                "uid": "a112dd6e-b855-4e83-ad03-809ca4b95c22"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5211",
                "uid": "2c848433-67ec-47d6-ae8b-09046bfbc183"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "5313",
                "uid": "9b07f52d-f342-4da7-86fc-b1af95d7194c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6237",
                "uid": "90805cf4-bbfd-4cf0-a4b0-904ffce8fbc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6348",
                "uid": "db4cbaa5-a5f3-4c85-8a54-719f66be6916"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "6377",
                "uid": "757505ca-9b91-45d4-8b12-298b80e17c87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:03Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1276",
                "uid": "8f745a5f-8bd0-472c-81f6-e056a247b6ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:deployers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3795",
                "uid": "618ccb93-9e0c-4056-8732-4ed88c2c9121"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-builders",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3774",
                "uid": "1cfe5d9f-6759-4162-880f-032b4b8a7863"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-machine-config-operator",
                "resourceVersion": "3737",
                "uid": "ac7125f9-8364-4231-92fb-ebe6afb74373"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "062b85eb8d31762de8669535a88ce29f531b40a99da464704a349df5a226794",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "062b85eb8d31762de8669535a88ce29f531b40a99da464704a349df5a226794",
                        "uid": "6420a71a-0cf2-45a2-8d62-84ff61110d3a"
                    }
                ],
                "resourceVersion": "16549",
                "uid": "a6e1438b-231c-4ec5-905b-8c26fded5329"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "062b85eb8d31762de8669535a88ce29f531b40a99da464704a349df5a226794"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "09e84d3fdfac1305b8f399db3dfe1b7c79d582fe1356304a82b56f71d74b69f",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "09e84d3fdfac1305b8f399db3dfe1b7c79d582fe1356304a82b56f71d74b69f",
                        "uid": "26ea0fff-3129-40b4-b895-2e31033ecd6f"
                    }
                ],
                "resourceVersion": "16536",
                "uid": "adb404e4-08e1-48ae-bfdc-58d4d3b46bbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "09e84d3fdfac1305b8f399db3dfe1b7c79d582fe1356304a82b56f71d74b69f"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:13Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "5aa5e4cbc2f6ac9107b7dd5bfb7c8725ca307e639be07100d6806658fe72f6a",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "5aa5e4cbc2f6ac9107b7dd5bfb7c8725ca307e639be07100d6806658fe72f6a",
                        "uid": "ec50a647-e1b7-4a1e-9367-394d2848d499"
                    }
                ],
                "resourceVersion": "16387",
                "uid": "460af0ee-3acc-4915-99cf-b66b4556f0bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "5aa5e4cbc2f6ac9107b7dd5bfb7c8725ca307e639be07100d6806658fe72f6a"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "6cf865aa5c15082e065f268dbaa3ff319c528f04756bcf44f2bc66f448c35d9",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "6cf865aa5c15082e065f268dbaa3ff319c528f04756bcf44f2bc66f448c35d9",
                        "uid": "c6ba4685-31d7-49fb-8dfc-dfdb625f133c"
                    }
                ],
                "resourceVersion": "16511",
                "uid": "8172eaae-6895-4eec-8651-24ea336755fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "6cf865aa5c15082e065f268dbaa3ff319c528f04756bcf44f2bc66f448c35d9"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:13Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "79f871b6353a8442b4f467c124caf7fa84891a4baa69c2582c3b4a7b5186b43",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "79f871b6353a8442b4f467c124caf7fa84891a4baa69c2582c3b4a7b5186b43",
                        "uid": "f4a6b580-1d0d-4b70-bf00-30ab94c9db5b"
                    }
                ],
                "resourceVersion": "16399",
                "uid": "7d10f218-790f-4c20-b686-60c890f48fca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "79f871b6353a8442b4f467c124caf7fa84891a4baa69c2582c3b4a7b5186b43"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5856",
                "uid": "0edd1265-fc07-46b9-b2e1-6647c9bd64e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5035",
                "uid": "f967b84f-efea-4356-b9b7-8a876b0508b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6546",
                "uid": "fcc923d5-ee4b-4ccd-be0f-1469fb6f20ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5100",
                "uid": "1ae47cff-cf4b-4f42-b462-e51c9424a862"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5777",
                "uid": "1215822c-f76d-4e2f-b5f3-27f0f786b22f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5734",
                "uid": "92bf487b-85d4-4e67-af71-d723850df7ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "4837",
                "uid": "08db1082-5f6e-4836-b570-f8fcbaac313e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6218",
                "uid": "bc221d56-58b5-4076-af25-8c69b7a6dd4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5112",
                "uid": "7b6be424-86f4-4d35-9c1b-5d7bee70c985"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5434",
                "uid": "13b29b59-60b9-4221-bf59-611486488d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6220",
                "uid": "757aaad3-6742-41f1-a862-eea77de1e524"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6445",
                "uid": "437846d1-46d8-4b42-afaf-5cd00644acba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-marketplace",
                "resourceVersion": "6468",
                "uid": "657c0026-7a98-432b-8ade-ee884d66f85b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "dedicated-admins-openshift-marketplace",
                "namespace": "openshift-marketplace",
                "resourceVersion": "5979",
                "uid": "69b877cf-9a67-437e-a1dc-e201e59edf59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-marketplace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "ffb141fe6a893934ae2bd5dece966211da4589ce7d3b723e9d299c9f584c778",
                "namespace": "openshift-marketplace",
                "ownerReferences": [
                    {
                        "apiVersion": "v1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ConfigMap",
                        "name": "ffb141fe6a893934ae2bd5dece966211da4589ce7d3b723e9d299c9f584c778",
                        "uid": "72c24953-2f12-4ef6-9e76-b4315b9e7e6f"
                    }
                ],
                "resourceVersion": "16522",
                "uid": "fcc8bb05-631e-478d-b302-a0e9448fcedb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ffb141fe6a893934ae2bd5dece966211da4589ce7d3b723e9d299c9f584c778"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3798",
                "uid": "a15e62ef-83d3-4b78-9c9a-1cc28e471cc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3796",
                "uid": "073f07f0-3c2f-43fb-b2ae-edfa3f8f5c11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-marketplace",
                "resourceVersion": "3751",
                "uid": "c486d381-796e-4160-a9dc-5d897649a3dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-marketplace"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:23Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-prometheusk8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12661",
                "uid": "338925a6-3375-4c83-821f-070c7f6b999a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6021",
                "uid": "2da49d52-f82d-4070-ac51-a5dd04479832"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-cee",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5349",
                "uid": "c9cc55fc-d95b-4e3a-9f22-1a633f5b18f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4989",
                "uid": "a1ceef02-d4c4-4718-b3f7-7abea0112584"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6462",
                "uid": "9e6cda4e-ccf1-4744-881e-8b15ecd0cb05"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5212",
                "uid": "6a4d45cd-d160-4f2b-b16a-18d959fea143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-lpsre",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5433",
                "uid": "2e8722e5-eb24-4e63-a25b-80819a2fd0a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5809",
                "uid": "1b5fd897-5364-4a2d-9714-db691a01512f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5756",
                "uid": "c6dd4301-00b8-45b3-8124-815e1cdf6d14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-mcs-tier-two",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5610",
                "uid": "517ca0d9-0be7-460a-822b-fe4bf741badc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "4979",
                "uid": "566dd65d-2fbc-4424-9c85-a77356d10d2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6158",
                "uid": "f5bbad66-3128-4cc4-b877-15e8d72a2d2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5076",
                "uid": "078e33f4-fc84-4180-b63a-4f91d78b2d60"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5393",
                "uid": "2dfb6789-3aab-45c9-9a7c-effda98ff5da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:44Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6141",
                "uid": "a6927482-43f8-4005-8309-a5efc01196af"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6379",
                "uid": "57c44bd7-e749-44f5-91c6-925e5bdaabef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-monitoring",
                "resourceVersion": "6406",
                "uid": "bfa11c84-b6bd-4aae-8433-47f7b1bea58a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:07Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1488",
                "uid": "71476f21-2469-4fd6-bd34-25392120ed09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:08Z",
                "name": "cluster-monitoring-operator-alert-customization",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1529",
                "uid": "4034d869-727c-422f-a5d2-0ec7f2bfaee9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "cluster-monitoring-operator-alert-customization"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:38Z",
                "name": "console-operator",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "2590",
                "uid": "02d0574a-1b27-42f9-9ec6-d00f8efbf4b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:13Z",
                "name": "dedicated-admins-hostedcluster-uwm",
                "namespace": "openshift-monitoring",
                "resourceVersion": "5284",
                "uid": "b95328df-13e2-4374-bde5-a1ba18bd3de7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-hostedcluster-uwm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:05Z",
                "name": "insights-operator-alertmanager",
                "namespace": "openshift-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1343",
                "uid": "d9238d22-a535-4e66-b01e-2079cd052019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "monitoring-alertmanager-edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12697",
                "uid": "9c18649e-76e5-45b2-bf2e-438468041a7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s-config",
                "namespace": "openshift-monitoring",
                "resourceVersion": "12699",
                "uid": "776c1df8-d326-4e83-8329-04b00e403408"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s-config"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:04:21Z",
                "labels": {
                    "app.kubernetes.io/component": "segment-backup-installation",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/instance-namespace": "tssc-tas",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "segment-backup-nightly-metrics",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rhtas-segment-backup-job-tssc-tas",
                "namespace": "openshift-monitoring",
                "resourceVersion": "22906",
                "uid": "df04b8b6-e991-4d7d-9569-f4e70541cfbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-segment-backup-job-tssc-tas"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-segment-backup-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "3799",
                "uid": "454a515f-a80c-456c-9837-1759518eb623"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-monitoring",
                "resourceVersion": "3797",
                "uid": "08d7be60-f24e-4add-89fd-c052d5819a63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-monitoring",
                "resourceVersion": "3772",
                "uid": "6247478a-6f3c-4649-842b-03450ba06608"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5953",
                "uid": "6588ed26-1d8d-4733-a4b2-b882456d93a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-multus",
                "resourceVersion": "4955",
                "uid": "b3a635b0-05c8-4384-bfb8-ae575b30b0ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6602",
                "uid": "2cb3425e-2624-4dd6-9541-15cad3cc1d82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5154",
                "uid": "d546bb24-eba8-455d-a053-8117af9f2037"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5663",
                "uid": "a68b76ad-ba3a-4fd1-9aef-30798306abdc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5694",
                "uid": "6f875bc5-ed21-43f8-ba55-06de9acd6711"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-multus",
                "resourceVersion": "4884",
                "uid": "d37cb531-9ddf-48ed-a0b8-e4d67bdde4dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6074",
                "uid": "a60bbdc0-ae7d-46a8-9acd-6d6d406fe5f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-multus",
                "resourceVersion": "5195",
                "uid": "0f2ed318-915e-405c-9ecf-8e26c7a31acb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-multus",
                "resourceVersion": "5517",
                "uid": "72109664-283e-49de-b8e9-e6eeaf895848"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6196",
                "uid": "df60263e-b82d-42ab-a1f9-17473acc7ab2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-multus",
                "resourceVersion": "6349",
                "uid": "53c04192-ebb3-459f-af7c-4c3bc8ba2597"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-multus",
                "resourceVersion": "6380",
                "uid": "4f5c0178-5841-4360-a633-23be8f9a36d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:30Z",
                "name": "multus-whereabouts",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2333",
                "uid": "2077c71a-574a-46c2-81fe-1c6f86042dc3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:33Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-multus",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2418",
                "uid": "5664ab09-d07f-47e6-81a3-c169d29f0dc6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-multus",
                "resourceVersion": "3793",
                "uid": "da2862e5-9f74-4680-9b4a-947b0b99117b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-multus",
                "resourceVersion": "3790",
                "uid": "7055735f-e737-4ebe-b22a-4c903e6e0c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-multus",
                "resourceVersion": "3792",
                "uid": "d0c30546-ba3a-4755-b64e-79ddbacf0aa0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6012",
                "uid": "47beb34f-6d99-42f8-b058-d5750635edae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:13Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6653",
                "uid": "23bac93f-a761-4c25-8c89-b441291fd0da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:17Z",
                "name": "backplane-cee-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6726",
                "uid": "682f7146-2649-487c-836c-ff2dc572e35f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-cee-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6534",
                "uid": "da7b0082-8d19-4171-a776-bc6d9577cabd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:21Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6762",
                "uid": "603bb0d8-d9cb-48e8-bde3-c1c3ac0ad156"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:18Z",
                "name": "backplane-csm-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6733",
                "uid": "cee694cf-1bde-49ac-9708-43dfab8811ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-csm-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5757",
                "uid": "a4cc4fd5-3188-496c-a6cc-0be88a26d890"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:20Z",
                "name": "backplane-lpsre-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6750",
                "uid": "32d75d11-a6df-46b6-8c2a-5af1aa711e6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-lpsre-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5706",
                "uid": "2c6ce44f-f594-4840-a906-bbcdb482fedd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6601",
                "uid": "fde15508-6ba4-498e-9d7a-01dadf20c089"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-mcs-tier-two-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5616",
                "uid": "56659cc2-cbfc-4bdd-a922-fdde45ede1b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mcs-tier-two-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6076",
                "uid": "041847cc-26cd-4dbe-9d8f-3aafa5e729f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-mobb-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6052",
                "uid": "aa121a6d-45d3-4eab-918d-6036bbbeddbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-mobb-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:14Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6655",
                "uid": "7ef955e2-e725-4da7-96f6-fab02366e20f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:26Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6798",
                "uid": "d40abd89-eff9-4d37-bb1b-39218a64316e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6330",
                "uid": "a7dcf463-4d18-4f51-9265-435a7a57c027"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-srep-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6239",
                "uid": "aa1e0cb1-10e0-4545-93ea-83bd12b42c37"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6382",
                "uid": "76a2169d-1674-424b-9cdf-860b11faea78"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6420",
                "uid": "310f9d00-423a-44ce-8964-b94273e1e71e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:21Z",
                "name": "backplane-tam-mustgather",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "6765",
                "uid": "1771966e-28fb-48f0-a177-60f48a4077ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "backplane-tam-mustgather"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "system:deployers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5566",
                "uid": "ee66c581-89c2-4b5e-8e8c-f7d96819ef41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "system:image-builders",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5564",
                "uid": "243c5de1-d6f4-4c3d-93ad-3511c5a3c7d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "system:image-pullers",
                "namespace": "openshift-must-gather-operator",
                "resourceVersion": "5565",
                "uid": "79953ddd-fc53-4f48-a3a0-0f9c23c4edf8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-must-gather-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5968",
                "uid": "82da1267-3154-4012-ad7d-f7f75a1ab33a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "4897",
                "uid": "394b9c95-980a-49c4-9681-7e4ed9dc9dd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6512",
                "uid": "2b10ec36-851c-4a8a-9764-76f73e84d9e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5119",
                "uid": "fe0f857d-c18f-46b2-a088-e7a1abbd8a74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5668",
                "uid": "ceb3f07b-de55-4647-a9da-62561402e5e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5710",
                "uid": "8d24d4ac-5119-429f-9a11-2a6227f6aaa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "4983",
                "uid": "cff1b17e-6db9-4660-971f-af35314da597"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6171",
                "uid": "1b8587e9-a368-40d9-bac7-b195577fdbd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "5163",
                "uid": "76ed451d-e290-41b8-aa9d-a77bafc813eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "5394",
                "uid": "62074fc3-c40c-4a6e-bc1b-5fa157f28bfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6177",
                "uid": "653c4b1e-be2c-4460-9e2e-5485277b9b21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-console",
                "resourceVersion": "6384",
                "uid": "e8e5b540-7e91-4f41-9e1a-bd6df4e639b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-console",
                "resourceVersion": "6479",
                "uid": "db11553b-6bd5-43db-a181-d4d77ca64eec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:20Z",
                "name": "system:deployers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4572",
                "uid": "ea3058f0-5db2-4476-b33e-233681dcfe50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:20Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-console",
                "resourceVersion": "4570",
                "uid": "7625a3da-72f4-4d1c-8600-1e6ffe855182"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:44:20Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-console",
                "resourceVersion": "4571",
                "uid": "071a811c-0259-4789-899f-94ca7761f26d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:37Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6005",
                "uid": "f47435ff-e574-4b65-a3d9-9006b2934780"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4935",
                "uid": "b37a846f-2e6d-42c9-9fa2-6c2473c02af9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6492",
                "uid": "e4c9774a-a9fe-40e3-8cf8-b9c93485294a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5156",
                "uid": "ba05cb93-8988-4bdb-87c9-9a218a44ac25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5670",
                "uid": "59b4a98e-b84a-41ce-8be9-3f3f3be8fa3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5685",
                "uid": "9130eacd-44ae-4c38-8ac7-b9c8f7b6c03f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "4951",
                "uid": "9164859a-287d-4ed9-8d9d-18afa9e1ca2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6130",
                "uid": "63671b40-7b9e-46bd-9ce5-d5f54d35f988"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5080",
                "uid": "02b512c5-6ec9-4257-a554-cacb586cb538"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "5519",
                "uid": "c20c8cfd-f0cf-4890-94a0-6adf8e822c42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6258",
                "uid": "40b93a8a-c928-44c9-bae5-671ba88410c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6412",
                "uid": "e521660b-c6a4-47e4-b5fc-8e1c697e28fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "6409",
                "uid": "0c9c40ef-f575-4055-b6c8-91bd460ceaad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:43Z",
                "name": "network-diagnostics",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2690",
                "uid": "d593b057-ed4e-4f1f-8509-f30400db39db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:54Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "4113",
                "uid": "38c356a5-da77-4277-8ba8-0e114909840e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3814",
                "uid": "56e93ae7-2120-4a07-b757-6f106d43e74d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3816",
                "uid": "f7c87f38-c325-4add-a7a6-be8ae6438d4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:49Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-diagnostics",
                "resourceVersion": "3794",
                "uid": "1f4ed521-14a0-418e-be01-56a461510d3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6058",
                "uid": "b2c00a81-724b-4068-9348-9f9d9520b375"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4968",
                "uid": "b6d941cc-c1cd-4bd5-bd5d-1c34022d64a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6464",
                "uid": "6a8d51a6-d136-4ac0-8b1b-4aa747dabcac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5173",
                "uid": "961646ff-d32c-4b77-bb96-116c158b1f28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5689",
                "uid": "1f228edb-8c5c-4c83-8805-85ba61fe4ea2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5641",
                "uid": "d33e3447-caa5-4b08-9588-d0512aea0f85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4880",
                "uid": "a40d8c0c-9048-4678-b966-3b9eca132348"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:45Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6178",
                "uid": "ee8f2dea-6401-43d7-ad95-f7805378a5aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:08Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5140",
                "uid": "b6ad82d4-c960-4f46-bfd6-e40f800af661"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:18Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "5471",
                "uid": "c9553cd9-cb5f-41f5-8bc6-c54e90c851de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6260",
                "uid": "a0b37859-3ef7-4367-9cfa-eb27825a156b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6447",
                "uid": "a9a4cbef-fb12-4e19-9f52-42c0462eaccc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "6532",
                "uid": "f8ed8884-24ec-4920-b1b9-4fdfff2d2773"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:55Z",
                "name": "network-node-identity-leases",
                "namespace": "openshift-network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "4149",
                "uid": "14a10261-9939-4db7-9235-584fa83f7cfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "network-node-identity-leases"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:54Z",
                "name": "system:deployers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4138",
                "uid": "c161f53b-c19d-4e4c-9d9c-c9f42c6b95f5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:54Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4137",
                "uid": "1412c322-53cf-40ce-8d9e-b7c575c2425b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:54Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-node-identity",
                "resourceVersion": "4136",
                "uid": "c3d93b52-7854-4258-8a56-b8c742c49b0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5894",
                "uid": "2261df5b-1321-4623-8cbd-128a3cd6788f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4899",
                "uid": "aaf693dd-51aa-4a70-8768-15214224cc40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6481",
                "uid": "6826ba6b-9c77-46be-a2f2-e1e55104a8d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5088",
                "uid": "c80ee244-8753-4ff8-90e2-6867ecf2d7f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5810",
                "uid": "ebd465df-7aed-4633-8184-2f454e4cded1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5658",
                "uid": "eac693c4-6773-4c08-b1a6-adacdbb7aa6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "4886",
                "uid": "6ae2f634-ac53-4e69-90da-1ba29327781e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6131",
                "uid": "799b7b37-dd7f-4052-82dd-1e729649d34f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5174",
                "uid": "3ecbf9eb-e17e-41dc-ac7f-59a8e746d98f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "5274",
                "uid": "453d62eb-76a7-462c-9bf8-3cea7a616b61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6281",
                "uid": "226244c8-bb8d-4b90-bdc5-cbf51fb520a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6291",
                "uid": "a3a49ef9-028a-431d-a85a-0ee4dc3f979e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:54Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-network-operator",
                "resourceVersion": "6353",
                "uid": "23a1da84-ce15-40bf-9861-c21a319c4be8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:06Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1376",
                "uid": "84ccc45a-a3f1-494e-b663-d47af318eeaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "3829",
                "uid": "10c134c0-c5e2-4f72-a8a8-dd81860c5478"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-network-operator",
                "resourceVersion": "3817",
                "uid": "f60c45a8-2609-4fb4-9c95-68af379eac4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-network-operator",
                "resourceVersion": "3788",
                "uid": "ea58ba01-52e2-4be0-af28-9a417725ee27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-node",
                "resourceVersion": "5897",
                "uid": "21bba3f3-45a6-408c-8808-592312527369"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-node",
                "resourceVersion": "4970",
                "uid": "febe8276-bbad-4196-9c97-dc643dc3d6cc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-node",
                "resourceVersion": "6483",
                "uid": "2939ab4a-1553-4c32-8e71-71b28d756e0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-node",
                "resourceVersion": "5196",
                "uid": "af47218d-fed8-4db2-8788-cef9823a4c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-node",
                "resourceVersion": "5812",
                "uid": "418cf58a-36b2-4314-8a75-34e12ab77c93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-node",
                "resourceVersion": "5748",
                "uid": "b67a4ea2-2147-4232-bf28-44099507a366"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-node",
                "resourceVersion": "4883",
                "uid": "ccf8cda3-909f-4121-8f0b-c334567cc0d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-node",
                "resourceVersion": "6197",
                "uid": "74971685-a744-4406-8e05-9ab1464f4b70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-node",
                "resourceVersion": "5200",
                "uid": "90c5223e-b140-49b0-a313-d112b5ef675b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-node",
                "resourceVersion": "5430",
                "uid": "253f947b-c521-4a5c-abca-e4b3595b65c9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-node",
                "resourceVersion": "6262",
                "uid": "9aa3d61c-a0cc-4ecb-a731-7e994a24cd97"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-node",
                "resourceVersion": "6280",
                "uid": "5637fe3e-37c2-4121-8b28-2eaa34d69506"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-node",
                "resourceVersion": "6500",
                "uid": "2bddc53d-d372-4b71-8931-2f3cbee36bad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-node",
                "resourceVersion": "3834",
                "uid": "c92a7ae5-8e8a-46d9-8e53-ab0a428b51c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-node",
                "resourceVersion": "3836",
                "uid": "66a51d1c-0fcc-45dd-9d28-e159641eb38e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-node",
                "resourceVersion": "3789",
                "uid": "e70c255d-9a44-4d9f-8a8f-54925d6cc0f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-node"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:03Z",
                "name": "system:node-config-reader",
                "namespace": "openshift-node",
                "resourceVersion": "461",
                "uid": "dc772873-1ef5-4631-a035-36e6efdbb4a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:node-config-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:40Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6077",
                "uid": "f5b83d28-0667-4ac0-bc28-09bddf9ad1d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4976",
                "uid": "c1827e10-734b-464e-b8e1-55dd5c519443"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6603",
                "uid": "9c111736-0b50-4533-84b0-36d6dc4d871c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5078",
                "uid": "4bc23306-ff14-4016-8fc6-580f0453eaae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5760",
                "uid": "3370cdc5-9707-4fca-a65f-2cb187710d29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5724",
                "uid": "e18cf84f-5cff-4d15-8ad0-b764c53893ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "4898",
                "uid": "49cd3b18-061a-4d4e-8964-4eaf1ee0dd55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6222",
                "uid": "31a07ca6-c9c9-4fc3-a3b6-5aa8a36c5f0d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5151",
                "uid": "344f5cc3-cd8d-491c-9dfb-4b03bdae2848"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "5400",
                "uid": "66f2bc05-d3d1-4b0f-9929-0ac2ecd30374"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6203",
                "uid": "005fb7d7-523e-40aa-99f7-2172371d4de3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6450",
                "uid": "f7038e6f-f526-4766-be77-391921178fde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "6411",
                "uid": "032189f2-81e4-41ed-b9a1-8712105ac77f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "3837",
                "uid": "3304112a-7a59-4533-92ef-e8105db1debc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "3835",
                "uid": "3ad7d3c6-85e8-4c49-9ab8-07554c238789"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operator-lifecycle-manager",
                "resourceVersion": "3815",
                "uid": "3aa6d028-59d9-4d75-8977-b89aa18c8738"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operator-lifecycle-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "admin-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5808",
                "uid": "1e78b60e-0fec-44da-983d-a9a40b276b57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "admin-system:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5813",
                "uid": "762699d7-4da8-4c2e-8ea3-1efbf6a0007c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5978",
                "uid": "cc8f8f91-2e5e-4966-88b9-ca606ee56df7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6629",
                "uid": "549967ba-e077-45a6-a5d2-3e609aaa1242"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:06Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6574",
                "uid": "17cae617-85c7-4af1-b3a5-74b7a995a34a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:17Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6686",
                "uid": "129594fd-ffee-492c-a517-67028a8bd0a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:31Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6828",
                "uid": "ef4c6a3f-8c4b-401a-b1e3-0e5c9d8ffb0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6773",
                "uid": "7afc91c2-0e0d-4ebb-9a3c-d7146f92f215"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:10Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6624",
                "uid": "e1b2d62d-f0e9-4df2-817b-87ea9e5b2a45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6224",
                "uid": "ccaabd89-adc3-4d94-956d-f193dc3147d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:13Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6650",
                "uid": "7d54f499-ecbe-409a-9f8a-09d13fd1ec93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:23Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6785",
                "uid": "ecc51d49-23bd-454a-96f6-74b7471c74d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6241",
                "uid": "a60aaf1f-7be1-4df8-85d6-cbc613141070"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6405",
                "uid": "1c51ecde-4326-4a98-bdb7-33e6ebcc0c85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "6446",
                "uid": "a26472e0-7692-434c-aafe-140b63121d6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5849",
                "uid": "1f9ac692-8c4e-44c7-b305-7f0ccc83a941"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5851",
                "uid": "83e307fe-e5e9-4d04-877a-68085b36298c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5844",
                "uid": "29cf788b-e1b1-47a0-96b7-75815a27dd4f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5843",
                "uid": "6ec929bc-2b7f-421a-abb6-5a62b25d69d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "openshift-operators-redhat-dedicated-admins",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5817",
                "uid": "2fb78745-8c49-48ff-9337-d16486a76e9c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "openshift-operators-redhat:serviceaccounts:dedicated-admin",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5822",
                "uid": "bd2a3c10-ba13-4980-9081-1eb4a8153553"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "system:deployers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5805",
                "uid": "c41791ec-d2a4-42ad-8912-c55c73b3a9f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5803",
                "uid": "d7e8beb4-99f1-4be1-b648-749a9d269f75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:45:30Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators-redhat",
                "resourceVersion": "5804",
                "uid": "460e0513-4838-43b8-9450-c612ab95aaf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators-redhat"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5858",
                "uid": "d87dac6f-adbe-45c3-a638-bb5702768663"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:59Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-operators",
                "resourceVersion": "4958",
                "uid": "e94738e7-fe75-4180-88ec-cfcd9106113d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6514",
                "uid": "4434bd16-4170-4d02-9bf8-c9f5970709ac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5049",
                "uid": "18e3ca3b-37a4-430a-8680-237bc86e602b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:27Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5746",
                "uid": "21081627-b3d3-4d98-a28d-82d2c42add11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5673",
                "uid": "5edf2dec-93e2-4e84-b630-bff73763e15a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:55Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-operators",
                "resourceVersion": "4873",
                "uid": "7f732453-37e5-4899-8c8d-0ac7f548f152"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:46Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6182",
                "uid": "6bbfd0e7-ef61-493e-b722-f2af92c93052"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:04Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5062",
                "uid": "23100f3c-8140-47a9-af86-bb5cc3b765cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5221",
                "uid": "68184a3e-5fd6-4b18-b8a0-605196c4907e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6221",
                "uid": "114b0d36-8c4a-4386-a87c-f1703554476b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-operators",
                "resourceVersion": "6388",
                "uid": "b7677a07-b95c-4969-8c01-e7bf71d75c8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:03Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-operators",
                "resourceVersion": "6533",
                "uid": "fce187ab-2d41-492c-8a74-46aa1f1cd800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5847",
                "uid": "1b9baeb4-843f-49c0-a087-da591db60789"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "dedicated-admin-serviceaccounts-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5852",
                "uid": "db4da772-947e-4ba7-ba21-f822bc716d6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:31Z",
                "name": "dedicated-admins-core-ns-0",
                "namespace": "openshift-operators",
                "resourceVersion": "5841",
                "uid": "4d29831a-c141-4026-877a-d2fe275824fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "dedicated-admins-core-ns-1",
                "namespace": "openshift-operators",
                "resourceVersion": "5845",
                "uid": "bbf0c883-89a7-4952-ab03-3766cf8e7733"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:36Z",
                "name": "dedicated-admins-openshift-operators",
                "namespace": "openshift-operators",
                "resourceVersion": "5973",
                "uid": "3edace07-3907-4783-8f6d-d66dea176163"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-openshift-operators"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:54Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.20.3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "aqAv32Xm5CGdRrOHSGPnQu9xOxupACkltd8iJ1",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-7dZc96pdcBCF2yHlvLNpxsecf0Tq8kgH84Jkxl",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "openshift-gitops-operator.v1.20.3",
                        "uid": "1fd98723-5df4-4dae-ac87-7be7e1a04bed"
                    }
                ],
                "resourceVersion": "21820",
                "uid": "08eb459f-da3a-4347-97be-5d89d5faf702"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operato-7dZc96pdcBCF2yHlvLNpxsecf0Tq8kgH84Jkxl"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:58Z",
                "labels": {
                    "olm.managed": "true",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-controller-manager-service-cert",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "openshift-gitops-operator.v1.20.3",
                        "uid": "1fd98723-5df4-4dae-ac87-7be7e1a04bed"
                    }
                ],
                "resourceVersion": "21814",
                "uid": "59e666d4-e1ed-4ba9-b4ef-e6f0b971dfda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator-controller-manager-service-cert"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator-prometheus",
                "namespace": "openshift-operators",
                "resourceVersion": "17753",
                "uid": "a645c68d-7e17-44df-9615-4ada3481ebba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator-prometheus"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:44Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-gitops-operator.v1.20.3",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-gitops-operator.v1.20.3",
                        "uid": "6d2b6b00-1935-49de-a09e-2e36ee2e7ac4"
                    }
                ],
                "resourceVersion": "17576",
                "uid": "94e1ebe1-b23c-4939-8653-3cddb1c34bd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-gitops-operator.v1.20.3"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:57Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-prometheus-k8s-read-binding",
                "namespace": "openshift-operators",
                "resourceVersion": "18109",
                "uid": "1a2ecb6a-4fea-43e7-8b8f-fb3aa800c448"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:55Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "openshift-pipelines-operator-rh.v1.21.1",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "openshift-pipelines-operator-rh.v1.21.1",
                        "uid": "5691431f-fdf6-4245-a04c-313f9dd90e62"
                    }
                ],
                "resourceVersion": "18059",
                "uid": "165bef9f-224e-4838-a1b1-ae8594c770bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-operator-rh.v1.21.1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:33Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhdh-operator.v1.9.4",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhdh-operator.v1.9.4",
                        "uid": "d55c1599-2c94-42e9-9a04-f4f7ff226853"
                    }
                ],
                "resourceVersion": "17047",
                "uid": "0c7b15ef-0551-4991-91d4-3ff410e93938"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhdh-operator.v1.9.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:39Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhdh-operator.v1.9.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "7PJxGMaoD2vAwcWHHxXXt9q6jpholdLFoaVeXN",
                    "operators.coreos.com/rhdh.openshift-operators": ""
                },
                "name": "rhdh-operator.v1.9.4-rhd-aLDt04vakp3HDjfCw7K9S3Ven0p91ezU2S9VEh",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhdh-operator.v1.9.4",
                        "uid": "42453287-fffe-4fd0-bcae-17d789736df5"
                    }
                ],
                "resourceVersion": "21233",
                "uid": "d750b076-9ee2-4edf-b5b4-f19c74e163f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhdh-operator.v1.9.4-rhd-aLDt04vakp3HDjfCw7K9S3Ven0p91ezU2S9VEh"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhdh-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:40Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtas-operator.v1.3.4",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtas-operator.v1.3.4",
                        "uid": "bfef10b3-d8cb-40a2-8e11-7696ecc912a4"
                    }
                ],
                "resourceVersion": "17327",
                "uid": "164280bf-f076-4a36-a3b0-680eefc158aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:44Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtas-operator.v1.3.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "i7bTIKZBx8FqjvSrhZBs4xBUckmilYzg7RKFC",
                    "operators.coreos.com/rhtas-operator.openshift-operators": ""
                },
                "name": "rhtas-operator.v1.3.4-rh-6jkXqEAFvzZGw4NCzsx1aZqPAnGtMfvcYMAjoa",
                "namespace": "openshift-operators",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtas-operator.v1.3.4",
                        "uid": "642e44dd-c1d8-406e-b7e8-67611aee5b51"
                    }
                ],
                "resourceVersion": "21556",
                "uid": "1df0d38e-156d-4634-a12c-cb8775b4ef20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtas-operator.v1.3.4-rh-6jkXqEAFvzZGw4NCzsx1aZqPAnGtMfvcYMAjoa"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtas-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-operators",
                "resourceVersion": "3855",
                "uid": "b29081b6-d4f8-4143-a6ca-44a0342e1e8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-operators",
                "resourceVersion": "3857",
                "uid": "bf6c139e-4316-4aaf-ac97-d1df8db6dfcc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-operators",
                "resourceVersion": "3832",
                "uid": "c0c94acf-1920-4a52-b646-551cd7fababb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:00Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "olm.managed": "true"
                },
                "name": "tekton-operator-info",
                "namespace": "openshift-operators",
                "resourceVersion": "18410",
                "uid": "07ec542d-19ff-42a8-b8d6-c9392e052b7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operator-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:33Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5900",
                "uid": "0fd7ed98-e2a2-4cb0-9b9c-acbaec336a2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4937",
                "uid": "a199007d-9d6a-46cd-a68d-fb03f33d97f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:00Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6467",
                "uid": "462a2969-12ab-46b5-8070-4890897f64a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:07Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5116",
                "uid": "75ab3743-194c-4ccd-b719-bb03743568bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:23Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5672",
                "uid": "993141da-0647-4156-8ef7-4f50875660b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5725",
                "uid": "023cc819-2637-4890-934c-3e73944b674b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "4936",
                "uid": "5a9616fc-fb93-4959-979a-aa8d14197eb6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6240",
                "uid": "68287be6-8522-4d21-8ce9-29b53bbe22f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:09Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5166",
                "uid": "d3f2d37f-f33a-4632-82c8-9df4925cbc21"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:15Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "5401",
                "uid": "b6c5fa72-bbd2-4264-a434-3792ec472200"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6223",
                "uid": "6f99cf5c-8149-4c32-9393-44677c1437f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:53Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6327",
                "uid": "582cb8c7-0ef6-49c2-bc79-f9e8ea4498bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "6493",
                "uid": "ca2c0377-bdc1-4f00-8a57-871591891831"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:39Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2625",
                "uid": "a35dc906-6108-470c-863d-e5da252bfb59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:37Z",
                "name": "openshift-ovn-kubernetes-nodes-identity-limited",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2551",
                "uid": "b13bf2af-812a-4223-8e90-b54563369a02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:42Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-ovn-kubernetes",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "6f8cdbc9-fff6-4c68-86f2-0081c8165c8a"
                    }
                ],
                "resourceVersion": "2656",
                "uid": "226a2555-bd76-4b42-82d2-24c5eba8371d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3854",
                "uid": "f4e33a97-8d48-4c0d-9f84-f3a04c8d040b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3853",
                "uid": "288361dd-3ef6-47e8-b0bb-4e83311f0156"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-ovn-kubernetes",
                "resourceVersion": "3831",
                "uid": "90c9a974-ca3c-490a-b920-e5f241311c90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6014",
                "uid": "30279b23-1626-48c9-86c8-8faf1a8c8d2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "4972",
                "uid": "f0a5927b-da3b-4f6a-b75c-6867c767826b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:09Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6610",
                "uid": "adf3b526-7af8-44c5-85d1-ee6c1a1f3d53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5051",
                "uid": "522a55b9-34af-4db2-860c-2cc67dcb0774"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:24Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5674",
                "uid": "20ae6caf-7761-4c05-b22c-10a759ae812e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:20Z",
                "name": "backplane-lpsre-package-operator-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5570",
                "uid": "c9dfed9f-bc17-42e0-8f0b-4e6ccec99f15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5727",
                "uid": "f425dbc5-ebec-4587-8b9a-713771dc48c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5001",
                "uid": "897f1568-d5be-41ea-84fd-1e5dadbd5bf0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:41Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6090",
                "uid": "5488afbe-d9c0-4aaa-a0fd-22d5dcace0b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:06Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5106",
                "uid": "709c7c26-feb3-483a-b0a6-b43b685fe3be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:14Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "5356",
                "uid": "8ce00895-eca0-47b7-bb3a-64026490b571"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6104",
                "uid": "b13a6c51-6651-4fdb-8e96-32696b8fef33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:56Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6394",
                "uid": "86d16dba-367e-4e61-be5c-59ed5750e36c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-package-operator",
                "resourceVersion": "6488",
                "uid": "1c0ecfc7-6781-40ed-a4a7-caf2e798d83b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "3873",
                "uid": "5bfee935-bbc6-4233-b577-17736b870a28"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-package-operator",
                "resourceVersion": "3856",
                "uid": "16be3138-1b1d-40cb-8ae8-3b915305ad90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-package-operator",
                "resourceVersion": "3830",
                "uid": "c866cce9-d9eb-4b59-98a5-db8fa8f86c42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-package-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:35Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24487",
                "uid": "0ef3882f-3078-4591-8a6c-3bd2258c6339"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:44Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24780",
                "uid": "e3caa1c0-c3c7-4178-9d75-49c57b3f43d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:48Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24857",
                "uid": "2e749373-9a00-4a8f-94d0-52df4314540b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:29Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24227",
                "uid": "4042bb49-f993-46a8-9572-4a6bfb92b2da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:37Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24524",
                "uid": "3c77ee87-9c95-44f6-9b61-60486c34c2ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:22Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23888",
                "uid": "a8823765-62f9-4019-a3cd-a8377e001c68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:21Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23866",
                "uid": "fd0efa8f-d906-4201-9a7e-d01b9271c017"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:30Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24245",
                "uid": "6991d0d3-4d75-4826-b560-b395e5dc434e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24948",
                "uid": "28398d9d-443f-4664-930c-3cd329add18f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:35Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24474",
                "uid": "4a6e5b68-564d-42d9-88a9-86c974ada022"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:37Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24532",
                "uid": "3714c076-7431-495f-bd0d-779c979470e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:47Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24835",
                "uid": "3b220a67-3ac2-4284-9e31-99034d8b218d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:49Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-pipelines",
                "resourceVersion": "24867",
                "uid": "174b6d10-697f-42ee-b3fc-842a49715725"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "74818c6c81032a15647b2ea2c4d22143fecf310c4f9cadd6796d0682d299aa5e",
                    "operator.tekton.dev/preserve-rb-subject-namespace": "true"
                },
                "creationTimestamp": "2026-05-12T18:05:58Z",
                "name": "openshift-pipelines-prometheus-k8s-read-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-post-7wnlh",
                        "uid": "e4fbd3e0-0540-4eea-b628-00ae5728fee5"
                    }
                ],
                "resourceVersion": "25011",
                "uid": "e180e7ec-6c53-4630-965e-51461843e114"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-pipelines-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "53a0a8e574b78282ef180fdab7d7435b709f129daa69bb6f58fcdf375cd20b9a"
                },
                "creationTimestamp": "2026-05-12T18:07:22Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-controller-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-k8vhr",
                        "uid": "06a40d14-f2b2-474d-946b-cc65425453e6"
                    }
                ],
                "resourceVersion": "27228",
                "uid": "a370e329-d2be-4435-87eb-87348b6f34b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-controller-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "99f73b6d03150835509b4740d12567643ab8a13605cb476dafa3c82b27516ede"
                },
                "creationTimestamp": "2026-05-12T18:07:22Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-k8vhr",
                        "uid": "06a40d14-f2b2-474d-946b-cc65425453e6"
                    }
                ],
                "resourceVersion": "27223",
                "uid": "d365f235-d30f-458b-842c-0e2121f6ad1c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "2471dd0226b724ca2d18e5f8da7e3b4922d48d53eb3fc3e939d7587ffcf7b34c"
                },
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "name": "pipelines-as-code-monitoring",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-k8vhr",
                        "uid": "06a40d14-f2b2-474d-946b-cc65425453e6"
                    }
                ],
                "resourceVersion": "27239",
                "uid": "9f6620a7-0f7d-4f53-8cd0-fb4d0227676b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "83bd081757fd258d8ab4dafedc73b48939c34efe9f732f5d1919b2b33ed4b8d2"
                },
                "creationTimestamp": "2026-05-12T18:07:22Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-watcher-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-k8vhr",
                        "uid": "06a40d14-f2b2-474d-946b-cc65425453e6"
                    }
                ],
                "resourceVersion": "27231",
                "uid": "eb2cbc23-fb95-4001-992a-d847f31e0a52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-watcher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "7f681e91bb6f1f4169abb923961b944d5106087818a71ec02e490c465ddd9602"
                },
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.39.5"
                },
                "name": "pipelines-as-code-webhook-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-k8vhr",
                        "uid": "06a40d14-f2b2-474d-946b-cc65425453e6"
                    }
                ],
                "resourceVersion": "27236",
                "uid": "638075dc-db86-4e82-8ff8-18ef82b62d45"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-webhook-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:05:21Z",
                "name": "system:deployers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23870",
                "uid": "563dbc46-fbde-4851-810e-f70052a48cf2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:05:21Z",
                "name": "system:image-builders",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23868",
                "uid": "6f7f1b54-2c8a-490f-9582-60f3cfefca34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:05:21Z",
                "name": "system:image-pullers",
                "namespace": "openshift-pipelines",
                "resourceVersion": "23869",
                "uid": "40c5f3c8-4c75-4e81-967c-572acc8f8c89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c0f6ec5668e7e7f399857882afa3ec90c5ba212dcf09eaffe0188616376bb615"
                },
                "creationTimestamp": "2026-05-12T18:06:21Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-pzmgk",
                        "uid": "e6e60fac-701b-4bf4-9b3f-2fc20b5b72eb"
                    }
                ],
                "resourceVersion": "25690",
                "uid": "93be25ff-5b52-4285-b80c-23ee809e5261"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "884b94a48c95dbf6b1b9bf8e9943e25fa925b338dfa2f9df3497d98fd8b7f584"
                },
                "creationTimestamp": "2026-05-12T18:06:21Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains"
                },
                "name": "tekton-chains-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-pzmgk",
                        "uid": "e6e60fac-701b-4bf4-9b3f-2fc20b5b72eb"
                    }
                ],
                "resourceVersion": "25692",
                "uid": "e5194315-9d2a-40a7-ab44-ad6563c42e8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-chains-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "ed0836e2f5225df25641c77c1722d096af29f2b18cb9f1bb30da4ed19c7d7c31"
                },
                "creationTimestamp": "2026-05-12T18:07:04Z",
                "name": "tekton-default-openshift-pipelines-view",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-hglpq",
                        "uid": "80052716-629a-4d63-a2aa-f55e3c467673"
                    }
                ],
                "resourceVersion": "26887",
                "uid": "0e02dedd-1b34-4fe9-9220-3d0967a548d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-default-openshift-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"66d2ec049390ec5408fe7e2135d1203647f18ddfde6d8ff59ca81e82818d4b53\"},\"name\":\"tekton-ecosystem-stepaction-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolverstepactions-1.21-mh2js\",\"uid\":\"c451cae8-9d75-411a-aaaa-53e3af238909\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-stepaction-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "66d2ec049390ec5408fe7e2135d1203647f18ddfde6d8ff59ca81e82818d4b53"
                },
                "creationTimestamp": "2026-05-12T18:07:01Z",
                "name": "tekton-ecosystem-stepaction-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolverstepactions-1.21-mh2js",
                        "uid": "c451cae8-9d75-411a-aaaa-53e3af238909"
                    }
                ],
                "resourceVersion": "26930",
                "uid": "94a5dd8c-94f1-4f10-bd9b-78170023a5e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-stepaction-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"RoleBinding\",\"metadata\":{\"annotations\":{\"operator.tekton.dev/last-applied-hash\":\"b565f4b1989286fa6f3d3863c1d70dde34b04da1127b41183be35029aa0a1bc9\"},\"name\":\"tekton-ecosystem-task-list-binding\",\"namespace\":\"openshift-pipelines\",\"ownerReferences\":[{\"apiVersion\":\"operator.tekton.dev/v1alpha1\",\"blockOwnerDeletion\":true,\"controller\":true,\"kind\":\"TektonInstallerSet\",\"name\":\"addon-versioned-resolvertasks-1.21-5bdhn\",\"uid\":\"58a2893d-98c0-4cab-b36d-4d2d87053246\"}]},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Role\",\"name\":\"tekton-ecosystem-task-list-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"system:authenticated\"}]}\n",
                    "operator.tekton.dev/last-applied-hash": "b565f4b1989286fa6f3d3863c1d70dde34b04da1127b41183be35029aa0a1bc9"
                },
                "creationTimestamp": "2026-05-12T18:07:01Z",
                "name": "tekton-ecosystem-task-list-binding",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-versioned-resolvertasks-1.21-5bdhn",
                        "uid": "58a2893d-98c0-4cab-b36d-4d2d87053246"
                    }
                ],
                "resourceVersion": "26932",
                "uid": "339bbaf9-61fa-4064-af72-a2a708f0e11b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-ecosystem-task-list-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0bd01e3301c82d2eb6b4eee7cbf7903607e101bdb502d380ebe9ff9231343357"
                },
                "creationTimestamp": "2026-05-12T18:05:33Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-events-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24344",
                "uid": "8da9a460-cdec-48e7-ba3e-2b0e99370a89"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "dccacdd13d189f934fd31ca1ea31fe0107572747feb1a80d5bf8d15b5cbfb6fc"
                },
                "creationTimestamp": "2026-05-12T18:05:33Z",
                "name": "tekton-operators-proxy-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24348",
                "uid": "10f85284-0f81-433b-94e9-5fa9cfd9b482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1327fd598f3184bb544b82f1dd3662f4b5e8ae00349d7556240009a18fc9b18b"
                },
                "creationTimestamp": "2026-05-12T18:05:32Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24327",
                "uid": "91fe0b24-0465-4077-bc46-c2e794de80d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "e2d4096009d6a635fc5f919477186ae8157a7969d0620f52cc92866d1502bf96"
                },
                "creationTimestamp": "2026-05-12T18:05:32Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-controller-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24335",
                "uid": "4fc03d0f-a876-4a26-b909-87c550ff36a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "3248e943bc11d61642b231635b39241ee7b26ab3f8e381b27c89fc5049b5163b"
                },
                "creationTimestamp": "2026-05-12T18:05:33Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-events-controller",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24343",
                "uid": "818fd033-3479-4098-8cb0-bd6270bea4db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-events-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "26523f78c08278053088654d17c8298f44bb6ca5e71e19b70db4e3b339613761"
                },
                "creationTimestamp": "2026-05-12T18:05:33Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24340",
                "uid": "ef9a7189-6b6d-4421-8963-bc7cc510bb8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "cf21d8a2d4f9297762d23f5a736ada7afffa14b46d836f73a8f68eff010e271a"
                },
                "creationTimestamp": "2026-05-12T18:05:33Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-resolvers-namespace-rbac",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24346",
                "uid": "8f460d11-baff-4d97-a79f-aebe3467d8b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-resolvers-namespace-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "feacf05f72daa696738a278cba02f8d16ad0c2201b6ce7ea2279602b39e26981"
                },
                "creationTimestamp": "2026-05-12T18:05:32Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24334",
                "uid": "e87cee24-0af8-4b3f-97db-cb74a9626b18"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b25299ff32a8e00f7998a5eaab1d8a9fe7b3335edb535ac14b22ac8c4b9d746b"
                },
                "creationTimestamp": "2026-05-12T18:05:33Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines"
                },
                "name": "tekton-pipelines-webhook-leaderelection",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-jrhjv",
                        "uid": "5c537dba-c4b5-4e59-a58a-918f244a35d6"
                    }
                ],
                "resourceVersion": "24337",
                "uid": "dc249f0c-1f9a-4b35-a3e3-0c7c3b169cb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-pipelines-leader-election"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "939835684665c13ba900f62813b45a1463d5d90b04a71d2283a071f70fb53afa"
                },
                "creationTimestamp": "2026-05-12T18:06:27Z",
                "labels": {
                    "app.kubernetes.io/name": "tekton-results-info",
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "v0.17.2"
                },
                "name": "tekton-results-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-8hfgs",
                        "uid": "1632f487-9080-4c1f-bf57-607671a01c12"
                    }
                ],
                "resourceVersion": "25899",
                "uid": "e99335be-3575-42cb-a279-ddc232788f36"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-results-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "9e2233a01d13f2e49191653af18930c8204c5a014d6716210dd9fd0fbd5ab70d"
                },
                "creationTimestamp": "2026-05-12T18:06:58Z",
                "name": "tekton-results-route-view-auth",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "result-post-42v9m",
                        "uid": "6defcd75-d84a-4bd3-b2b7-e5640c2f7c37"
                    }
                ],
                "resourceVersion": "26655",
                "uid": "3eb25894-479a-40d0-aadc-a054648cbdfc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-route-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "32dddc9540622e1351b0b2f782f10b2723d86d3a7bdc225c4010ebdabb0a9139"
                },
                "creationTimestamp": "2026-05-12T18:06:02Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-gl5xk",
                        "uid": "5d2461fa-a539-4cf7-bbfb-7d0dd7d964b6"
                    }
                ],
                "resourceVersion": "25157",
                "uid": "6fbc3663-e9b3-403a-bb0d-381076770a1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "d0b4e0ee8e1770d8f0a9233b726350c10deac86a04c936996275b28a62022acf"
                },
                "creationTimestamp": "2026-05-12T18:06:02Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-info",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-gl5xk",
                        "uid": "5d2461fa-a539-4cf7-bbfb-7d0dd7d964b6"
                    }
                ],
                "resourceVersion": "25160",
                "uid": "c197bbef-2708-4f56-b7e9-a3077aac3dbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-info"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b6bbc1e408bf2128f5d4cdb13f452a5685598f6f31054f3e03ca08ec89e0148c"
                },
                "creationTimestamp": "2026-05-12T18:06:02Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "namespace": "openshift-pipelines",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-gl5xk",
                        "uid": "5d2461fa-a539-4cf7-bbfb-7d0dd7d964b6"
                    }
                ],
                "resourceVersion": "25156",
                "uid": "e883fedb-322e-4737-bd06-2324f9308f59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tekton-triggers-admin-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:39Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6059",
                "uid": "7b1d037b-77e8-4edf-a4df-ee9dae28937b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5004",
                "uid": "8e8aaa40-a38b-4a21-ac91-c6979811dbe5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6484",
                "uid": "82ea7bbc-5128-4a1b-a85d-cffcafa5946e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5199",
                "uid": "666670b8-67d7-421e-8141-2a009eab8618"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5692",
                "uid": "05938914-340a-4b44-bd06-cb3f49144e1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:21Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5615",
                "uid": "330188ec-dfc1-42e6-bae8-8bfeef6e8f51"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "4962",
                "uid": "eb5cc1f9-436c-4e8f-b65c-30adb77bdb6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:49Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6243",
                "uid": "bfb3858f-39fd-4c96-9087-dd7d1e8a0487"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5204",
                "uid": "2537e6fc-077d-497c-afaa-5a33c8e24660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:19Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "5513",
                "uid": "a9a2dd9c-2583-4928-b5be-f7705487b641"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6106",
                "uid": "69586a02-5c64-4a3f-b3d2-9f6d14b81017"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:52Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6321",
                "uid": "4530d79f-b49a-466e-847c-a126e9dfe067"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:02Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "6513",
                "uid": "b4857a02-475c-44ef-9b1e-ae09f969dc42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:43:10Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "openshift-route-controllers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "1679",
                "uid": "d08b567e-79b7-4289-97b5-691a7c1c2d07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "openshift-route-controllers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "3872",
                "uid": "6b225bf6-44ff-48a5-9ae5-0e06d76c2a71"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "3875",
                "uid": "98af699d-ddd1-4548-a136-508c1386475c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-route-controller-manager",
                "resourceVersion": "3833",
                "uid": "4455d919-afbc-414b-b6bc-c4f989d57e13"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-route-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:34Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5909",
                "uid": "ef135b22-e0c1-4d25-8c72-9265defd9f6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:58Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4922",
                "uid": "3e65bead-6a8e-49f0-b46a-75be08163d56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:04Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6548",
                "uid": "c252547f-d6ff-412d-9eb8-b5dd5695f250"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:03Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5055",
                "uid": "7f5a8e8f-61d7-4c04-8102-e81a5cc0ec25"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5695",
                "uid": "50202716-3465-456f-9c18-22d207769c75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5696",
                "uid": "9301c9df-03b6-4517-b2eb-1a634965b831"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:00Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "4964",
                "uid": "490a02cd-ba9b-44fc-b46d-d2ceb716d2b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:42Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6103",
                "uid": "a4fd594b-56a2-4a95-8aeb-66298a6d5d8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5185",
                "uid": "620f3d90-a69c-4e2f-b6ee-c8258aebf3f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "5266",
                "uid": "cf3fa64d-f5db-46c7-84f8-5dd76c577b0e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:48Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6227",
                "uid": "3eb55b22-1ec8-41c7-8605-7ff9d1abdb7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:51Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6282",
                "uid": "6f2e1781-cc63-467d-be24-b2fa188d33ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:57Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "6413",
                "uid": "82a895e1-c70a-4ad3-9786-816485795add"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:55Z",
                "name": "prometheus-k8s",
                "namespace": "openshift-service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "940",
                "uid": "c0902201-1eda-458c-b2ac-e4155212828c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "3877",
                "uid": "687b6a7b-244e-47f9-8bf2-1054bbf7b722"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "3874",
                "uid": "fb7f192c-4683-4b1f-82c8-3d0e2aba296d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca-operator",
                "resourceVersion": "3858",
                "uid": "491f3c31-f347-40eb-a960-bd5b30c1c8f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:04Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11800",
                "uid": "72aa5fc9-4c96-4b97-9805-6b622a3262c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:47Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11483",
                "uid": "a802066e-f01d-4d4d-8abd-3c5bfec9c789"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:48Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11541",
                "uid": "43353554-f91f-4ab4-8c7b-e33dec913c90"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:10Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "12013",
                "uid": "7a15bf3b-a8a1-4134-a294-fb1c28d3f5bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:59Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11745",
                "uid": "e73449f0-67d7-42fb-9e87-cc2ec1da4ff4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:07Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11818",
                "uid": "9ee1780a-323d-44bb-9149-bfcf6742c9c6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:17Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "12306",
                "uid": "c0daf391-4da9-4354-83b6-26081d2e2de8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:02Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11784",
                "uid": "d79ce8dc-3d12-4d0c-bec2-422faf045eb2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:55Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11672",
                "uid": "8b61d508-02e8-4b5f-b7c3-6152a046a934"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:21Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "12344",
                "uid": "0cdfaa0f-c6d3-47a5-aa9b-94ababe63391"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:56Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11685",
                "uid": "fb9e80ba-abba-4276-bf52-dbe51c2f5d9a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:15Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-service-ca",
                "resourceVersion": "12263",
                "uid": "30c11046-0f40-4faf-bf10-5f96a6abc7b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:10Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11980",
                "uid": "592215c1-906d-4588-bb82-c27bf378ddfb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:56:43Z",
                "name": "system:deployers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11394",
                "uid": "42b0a3bc-d1d1-402a-b7c7-c0449def1b48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:56:43Z",
                "name": "system:image-builders",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11393",
                "uid": "1536880a-0e81-429c-95ad-cdf080a98761"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:56:43Z",
                "name": "system:image-pullers",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11395",
                "uid": "7503c152-d75e-402d-877c-f297dc932ae0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:56:43Z",
                "name": "system:openshift:controller:service-ca",
                "namespace": "openshift-service-ca",
                "resourceVersion": "11391",
                "uid": "deff751a-561b-4d48-8f3d-43d4a5147476"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6023",
                "uid": "902794f8-ddae-4a92-b47a-c632b0b6fff9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:02Z",
                "name": "backplane-cee-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5005",
                "uid": "55f0ffca-e006-4e21-b6d0-8129bb0cd110"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-cse-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6486",
                "uid": "819facc5-e296-4b2c-9a54-770c9d4106a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:11Z",
                "name": "backplane-csm-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5201",
                "uid": "4ca290c3-e127-4811-b73d-157f1d15f1ae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:29Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5767",
                "uid": "723d7482-0f6a-4bd0-aa5a-2d36c20a242a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:26Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5717",
                "uid": "77f13ce3-0e01-40cd-a4e6-e741bc6b350b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "4981",
                "uid": "aec0d095-f81e-4319-9860-bf5c8efe0006"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6133",
                "uid": "5a8623ca-c034-42e9-ab29-7b2f4e02d29b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:10Z",
                "name": "backplane-srep-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5168",
                "uid": "8ac0674a-56f7-498b-91ab-b6ba714bd8e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:12Z",
                "name": "backplane-srep-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "5269",
                "uid": "bbd3a664-c277-4ec3-acc6-05b0dcbb11f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:47Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6199",
                "uid": "62da126a-a3a4-498e-be60-fe1489e110a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:59Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6456",
                "uid": "23ee202b-09c7-4072-9a57-4bf2e7fca974"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:55Z",
                "name": "backplane-tam-0",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6385",
                "uid": "238f9202-e16a-411b-9745-474118f8d557"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:08Z",
                "name": "cluster-monitoring-operator",
                "namespace": "openshift-user-workload-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1510",
                "uid": "fa3f7d41-85aa-4bd7-832f-a3156f3b219d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator-namespaced"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "dedicated-admins-uwm-config-create",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6015",
                "uid": "b206cab8-333e-4707-8b21-17bd71c2ab01"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-create-cm"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "dedicated-admins-uwm-config-edit",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6010",
                "uid": "6d50d08f-c569-400f-9896-97e421b4484d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "user-workload-monitoring-config-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:38Z",
                "name": "dedicated-admins-uwm-managed-am-secret",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "6022",
                "uid": "4a5422bb-fe42-49e5-81c8-456443975bad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "dedicated-admins-user-workload-monitoring-manage-am-secret"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:57:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "3.2.1"
                },
                "name": "prometheus-k8s",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "12698",
                "uid": "01369934-94c7-48ee-bd74-2b93c232a8e7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:deployers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "3892",
                "uid": "a54e0599-64f7-4f2a-b955-cd649a365eab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-builders",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "3903",
                "uid": "2d87183b-15ca-4088-b832-e9535d38085e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:50Z",
                "name": "system:image-pullers",
                "namespace": "openshift-user-workload-monitoring",
                "resourceVersion": "3876",
                "uid": "2a70d076-dc66-4273-bbb5-2f2d20beba33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:32Z",
                "name": "backplane-ai-agent-0",
                "namespace": "openshift",
                "resourceVersion": "5860",
                "uid": "7e595819-043e-4e62-8f10-9b55426fd54b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:01Z",
                "name": "backplane-cee-0",
                "namespace": "openshift",
                "resourceVersion": "4991",
                "uid": "9bac8c8d-912b-44da-a8fc-273ea5fb19b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:08Z",
                "name": "backplane-cse-0",
                "namespace": "openshift",
                "resourceVersion": "6596",
                "uid": "e99e3254-b8ae-45ce-a85f-3c8ee54a54e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-csm-0",
                "namespace": "openshift",
                "resourceVersion": "5091",
                "uid": "a6e8e48d-7f4e-4f08-9795-5db6e6d1a53e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:25Z",
                "name": "backplane-lpsre-0",
                "namespace": "openshift",
                "resourceVersion": "5698",
                "uid": "453832ae-cb97-437b-9e7f-25102c136d99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:28Z",
                "name": "backplane-lpsre-package-operator-1",
                "namespace": "openshift",
                "resourceVersion": "5749",
                "uid": "566ae5f8-06c1-487c-a722-4b6914ae222a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:44:56Z",
                "name": "backplane-mcs-tier-two-0",
                "namespace": "openshift",
                "resourceVersion": "4900",
                "uid": "d754ae26-7d0a-4c7a-aabe-df228fbcdb56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:43Z",
                "name": "backplane-mobb-0",
                "namespace": "openshift",
                "resourceVersion": "6137",
                "uid": "a48efc9c-d4db-4347-be22-afb01fed0b33"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:05Z",
                "name": "backplane-srep-0",
                "namespace": "openshift",
                "resourceVersion": "5095",
                "uid": "bd474464-bdca-42e3-9d67-cf08924001be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:16Z",
                "name": "backplane-srep-1",
                "namespace": "openshift",
                "resourceVersion": "5436",
                "uid": "d30e907a-d824-4480-9949-2669253e3db4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:50Z",
                "name": "backplane-srep-ro-0",
                "namespace": "openshift",
                "resourceVersion": "6268",
                "uid": "b63ddda9-4568-4c80-b530-cf923b23b15c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:45:58Z",
                "name": "backplane-srep-ro-1",
                "namespace": "openshift",
                "resourceVersion": "6437",
                "uid": "03f3d9a0-0478-4852-a9d9-24e510c2a955"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T17:46:01Z",
                "name": "backplane-tam-0",
                "namespace": "openshift",
                "resourceVersion": "6497",
                "uid": "c14014dc-4bb0-4379-bad6-a0c7c6a13edc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-readers"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:09Z",
                "name": "cluster-samples-operator-openshift-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1573",
                "uid": "ba8f3553-725f-4923-afee-25d7ba84082c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "OperatorLifecycleManager",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:43:09Z",
                "name": "copied-csv-viewers",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "684454de-050d-4bdb-abee-4491a964d907"
                    }
                ],
                "resourceVersion": "1549",
                "uid": "df80e302-5674-4ab8-af52-390aba0c6756"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "copied-csv-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "openshift-pipelines-edit",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23922",
                "uid": "88f34eba-aeec-4e27-9da8-0ccec2cd7bd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c16a7fef8faa798350e8f7c2b7bbeb54efdd818ccbf90f73c8f11ab92a7a9e9f"
                },
                "creationTimestamp": "2026-05-12T18:07:39Z",
                "labels": {
                    "app.kubernetes.io/part-of": "pipelines-as-code"
                },
                "name": "pipelines-as-code-templates",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-post-v6kcm",
                        "uid": "d0bc864c-294f-41d5-99d0-370cc243dbf1"
                    }
                ],
                "resourceVersion": "27842",
                "uid": "35a0dc23-f041-4208-9403-4d30e0c22e26"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "pipelines-as-code-templates"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23920",
                "uid": "695498f3-c958-4f87-a5b5-cdfa0eb4730e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-12T17:42:03Z",
                "name": "shared-resource-viewers",
                "namespace": "openshift",
                "resourceVersion": "460",
                "uid": "96084628-befe-40a4-b0cc-b14b46819e1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "shared-resource-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:deployers",
                "namespace": "openshift",
                "resourceVersion": "3162",
                "uid": "55c41a10-127a-4528-a290-96544c0c6968"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-builders",
                "namespace": "openshift",
                "resourceVersion": "3163",
                "uid": "a6b5b612-187c-4425-b1ee-7aa9d89baf93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T17:43:47Z",
                "name": "system:image-pullers",
                "namespace": "openshift",
                "resourceVersion": "3073",
                "uid": "09565e63-f8fc-4a45-8896-1f1636ab554d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "38679c494043dc98174f37dabde4360d09b95b5ae11d624014f675cc5fb70b3f",
                    "operator.tekton.dev/preserve-namespace": "true"
                },
                "creationTimestamp": "2026-05-12T18:07:03Z",
                "name": "tekton-default-pipelines-view",
                "namespace": "openshift",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "addon-custom-pipelinestemplate-hglpq",
                        "uid": "80052716-629a-4d63-a2aa-f55e3c467673"
                    }
                ],
                "resourceVersion": "26875",
                "uid": "791cff4f-248d-420d-85c0-bf7d4bf2c7dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-default-pipelines-view"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "rhbk-operator",
                "resourceVersion": "16145",
                "uid": "5a03ca4b-ae5f-4e4c-afef-d498e3bbb17d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:15Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "16464",
                "uid": "4c31f195-b049-4381-b800-503dcf054995"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "16487",
                "uid": "83f81872-428b-40d7-9282-13aa3df508a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "16569",
                "uid": "daf7999b-3878-4bad-baa3-edf803609fbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-1",
                "namespace": "rhbk-operator",
                "resourceVersion": "16508",
                "uid": "71c0d356-f5b4-4f7a-a3ab-f8e0914ea43f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:15Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhbk-operator",
                "resourceVersion": "16456",
                "uid": "8644a55b-f26b-4603-9522-9a69b28ed320"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23931",
                "uid": "92e17c8a-6753-4985-8155-33b0ae7efea9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23928",
                "uid": "d4e26979-4b85-4866-9658-bdafbb04ff06"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:26Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.2",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "rhbk-operator",
                    "olm.permissions.hash": "36jW9QlaNsvzPJGRuCuNRcHk7hOZa26E3ofORt",
                    "operators.coreos.com/rhbk-operator.rhbk-operator": ""
                },
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.2",
                        "uid": "7756f29d-d7c3-4884-bbf0-cd4f143d4af9"
                    }
                ],
                "resourceVersion": "16996",
                "uid": "63642558-a06c-4334-9e9e-1d005c4f6aa8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:23Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhbk-operator.v26.4.11-opr.2",
                "namespace": "rhbk-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhbk-operator.v26.4.11-opr.2",
                        "uid": "9469bd25-13a8-4635-93fe-9fbc590633d6"
                    }
                ],
                "resourceVersion": "16769",
                "uid": "2f3061c4-991f-4b8f-818b-bcf74fc86def"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-opr.2"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "rhbk-operator",
                "resourceVersion": "16296",
                "uid": "bdc211f2-c61e-4ef2-89b3-f1fd2ae90232"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "rhbk-operator",
                "resourceVersion": "16285",
                "uid": "97926d95-5c2f-4312-a2f5-1ac0295d9bad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "rhbk-operator",
                "resourceVersion": "16283",
                "uid": "a35a1d83-04e1-498b-9dc2-d8fd5513a097"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16191",
                "uid": "8328cbc4-307e-49da-b870-2522f8ca5107"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:15Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16468",
                "uid": "9314d05d-cfe0-45ec-9f3d-78fb1f95c883"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16492",
                "uid": "d06a5f3e-998a-4d43-a640-cae75dbb5dbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16521",
                "uid": "aaff7dd3-6f1e-4492-87f6-1f7ac219505b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-1",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16501",
                "uid": "bfb4f367-2a06-440b-8a90-ba29cc4fbf3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16472",
                "uid": "3245c2d6-b37b-47ff-9a05-fdb02ea3ab23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "openshift-pipelines-edit",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23939",
                "uid": "6475b148-4bfb-4940-8173-0a15e935e671"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "rhtpa-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23936",
                "uid": "5504a06b-c7f6-4e98-b090-7b3925ea6678"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16298",
                "uid": "71af4571-ae71-4102-96f8-ce315c3cbd50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16301",
                "uid": "b89dc86c-5c3d-41f6-95f3-c1ea590893df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "rhtpa-operator",
                "resourceVersion": "16304",
                "uid": "493dd232-6460-4bdd-8c58-38c3ea07f5de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:rhtpa-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17762",
                "uid": "95db4850-7339-4dd2-9c22-cdf685e939a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17745",
                "uid": "f6e6d62f-f423-4090-a1b1-cdcf9c97f8f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "dedicated-admins-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17723",
                "uid": "40a87c92-54a0-44c6-add8-86e32d9ab97c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "dedicated-admins-1",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17764",
                "uid": "8d0467d5-c094-41e4-89ba-5bb58d37e8aa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17776",
                "uid": "8293164f-18fd-4d53-8d91-f58cd480de0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23947",
                "uid": "856d2c69-c81a-4d92-937c-b77c6137ea3a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:23Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "trusted-artifact-signer",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23945",
                "uid": "616b2a48-bd91-4081-b183-7d82c39a1d80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "system:deployers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17757",
                "uid": "c4f36f20-e12f-4d56-8db4-25d1dc6c2256"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "system:image-builders",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17765",
                "uid": "f72b8b1c-379d-4c56-a07f-928f5c1f4446"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:48Z",
                "name": "system:image-pullers",
                "namespace": "trusted-artifact-signer",
                "resourceVersion": "17763",
                "uid": "f607579b-8461-4f71-8097-e4d6598a9957"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:trusted-artifact-signer"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27491",
                "uid": "f219ba9b-0e19-4989-8df5-4d32421d8b49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:30Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27695",
                "uid": "1fda81ef-e7fc-4413-be50-3cad71cfe09c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27432",
                "uid": "6f7ab407-be6e-48c6-888d-30478b1b68fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:30Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27694",
                "uid": "125a1e9c-37a8-4091-bd9a-2408487998b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27438",
                "uid": "1f8a8bc6-9e2b-4a11-b727-694ed0b48d7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27436",
                "uid": "6c8d00ee-1f47-4cc8-b8fd-4e8bd89f79c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-ci",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27429",
                "uid": "27532ba7-ed68-4d32-87f9-9e96be8d6ff6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:deployers",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27394",
                "uid": "3387adf1-0adb-40fc-8b28-cb37ae81f452"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27400",
                "uid": "72dbcbc3-054d-4db4-9e82-33af32d60887"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27397",
                "uid": "102972c6-4951-4869-bdb1-df334463239b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-ci"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27507",
                "uid": "312ff18b-808f-4766-a6a5-90f17df76d2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-ci",
                "resourceVersion": "27536",
                "uid": "367a2e5c-ae44-43fb-93b8-f8d0e9097266"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-development",
                "resourceVersion": "27535",
                "uid": "bc903eb8-bc16-4909-8300-7d3636e8a719"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-development",
                "resourceVersion": "27299",
                "uid": "14180a12-4834-4cd5-aedf-439e0582fada"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-development",
                "resourceVersion": "27425",
                "uid": "a6f8d2f3-0573-4dfd-acfa-bcf9b28e1b81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-development",
                "resourceVersion": "27344",
                "uid": "0bd2ad97-a3e7-493c-8a9c-76974385c7f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-development",
                "resourceVersion": "27426",
                "uid": "e3247129-3b7f-42fe-8724-9ca76bb26f9b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-development",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27466",
                "uid": "003d4207-565f-4c18-a2fe-83bbe8b37a5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-development",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27455",
                "uid": "2eac911a-f44a-4881-af75-fc3619924a5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:deployers",
                "namespace": "tssc-app-development",
                "resourceVersion": "27399",
                "uid": "939ea3b8-3c4c-48fd-99b9-43c730d81ebb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-development",
                "resourceVersion": "27403",
                "uid": "183294c9-86eb-4625-ac69-d2bb7478d915"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-development",
                "resourceVersion": "27396",
                "uid": "79557020-b526-454c-9595-894d57c7950a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-development"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-development",
                "resourceVersion": "27359",
                "uid": "4ccf23f5-d62d-4726-be1c-32493bc6b550"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-development",
                "resourceVersion": "27408",
                "uid": "f13fcd79-f70e-4d50-b6e5-53eaf1d73b76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27554",
                "uid": "8f0d5021-8b1c-4820-8cdb-9867dd71eb6d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:30Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27703",
                "uid": "4940163e-e4bd-4c02-a70a-aec4f0d50350"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27437",
                "uid": "593a6e3d-0d34-47bd-bf79-a51dd71eb3bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:30Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27692",
                "uid": "6a58868f-ca33-4c99-9780-1958ee496d82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27416",
                "uid": "45fdf60f-c8d1-4b52-8a04-08b4c3ec35ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-prod",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27508",
                "uid": "58fa15e7-1eda-439b-b882-c9affd26a2d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-prod",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27483",
                "uid": "7d3d379b-ef4b-4b71-8016-9cbb8980ad48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:deployers",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27401",
                "uid": "803018c4-58e7-4707-8a44-8499159dc6b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27404",
                "uid": "29be23d0-52fa-46ef-960d-3dd4b5271478"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27398",
                "uid": "e2488a83-7f76-4e4b-8a39-2146057bba58"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-prod"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27527",
                "uid": "f07f45d9-06fa-4bad-9f8d-b533b9ea09dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-prod",
                "resourceVersion": "27542",
                "uid": "613702c9-3bb2-41ff-9aa7-bb1e05b96b1b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27540",
                "uid": "5579f9dc-44f1-4f58-994c-33b40f568537"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27345",
                "uid": "cc1666b1-cb06-4975-93ce-34b1f94f7998"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27417",
                "uid": "f0089c59-32ad-427f-8771-03d28cc99c38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27379",
                "uid": "87dcc2f5-81e6-472d-9d9a-59171c617e5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27464",
                "uid": "5e6c3daf-14e1-452d-86c9-43cf24aa6728"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-app-stage",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27543",
                "uid": "6789d223-8813-4185-9814-1d5c96779cc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:07:25Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-app-stage",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "27537",
                "uid": "b96ed790-b8f1-4170-a646-93ac32a6c75e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:deployers",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27395",
                "uid": "c28fd292-e14b-487b-80bb-8f49a3ca2d8d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "name": "system:image-builders",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27402",
                "uid": "61f2c599-7b04-4dce-bca6-095af1761222"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "name": "system:image-pullers",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27378",
                "uid": "789aae71-e927-4111-8574-7cdb4401e892"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-app-stage"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:23Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27382",
                "uid": "cdee21ea-ab9f-4d91-8a7c-f82e7b63fcb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:07:24Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-app-stage",
                "resourceVersion": "27418",
                "uid": "9e88f7ac-1bd8-4e18-9382-bb0519691127"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "tssc-dh",
                "resourceVersion": "16189",
                "uid": "4574deb7-e5a9-4f43-ba5e-1b3eac44a1f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-dh",
                "resourceVersion": "16471",
                "uid": "86d50481-d2d1-41d1-966f-30f48b9dde93"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-dh",
                "resourceVersion": "16498",
                "uid": "a92a773c-fcd3-44b8-aed7-b3068970dcdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-dh",
                "resourceVersion": "16534",
                "uid": "9f49ff0d-b47e-4c84-8e1d-ad8f32676b85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-dh",
                "resourceVersion": "16484",
                "uid": "632fb45a-c833-4859-826f-20cd70c7f6de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:15Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-dh",
                "resourceVersion": "16465",
                "uid": "863db9dc-a060-44a2-9b48-919c66736c3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-dh",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23965",
                "uid": "b62abe48-da65-48b7-ba49-f7d9c447d787"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-dh",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23962",
                "uid": "6f127bdb-a879-4c50-9e4a-e329f4939b69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "tssc-dh",
                "resourceVersion": "16319",
                "uid": "536adaa9-c514-410c-bfd1-16c6ba931c40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "tssc-dh",
                "resourceVersion": "16313",
                "uid": "0a82f7eb-6c33-4b44-a9c3-3d2bc312e460"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "tssc-dh",
                "resourceVersion": "16312",
                "uid": "fd55f972-6d44-44a7-8d08-cd02c7e333b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-dh"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "tssc-gitops",
                "resourceVersion": "16146",
                "uid": "4d05f44d-b40e-49d9-94f0-d7c3a7c2b445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-gitops",
                "resourceVersion": "16476",
                "uid": "23b8cb4e-ec8e-478b-bc30-ca71a44fa3ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-gitops",
                "resourceVersion": "16500",
                "uid": "3e1ddc94-fedf-4aff-be74-4ba38badd660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-gitops",
                "resourceVersion": "16547",
                "uid": "90572d74-2664-4c06-8183-df32410f7e9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-gitops",
                "resourceVersion": "16486",
                "uid": "865ebf1d-c44d-4c33-8a22-a9889c8a9524"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:15Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-gitops",
                "resourceVersion": "16469",
                "uid": "81bc86df-a7a7-4fd9-93a9-176a245bde47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23974",
                "uid": "3b2df535-70d2-4e8f-bf65-0b8ce5b9b377"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23970",
                "uid": "43c13aad-3484-4715-ac55-9da2e1135a96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "tssc-gitops",
                "resourceVersion": "16299",
                "uid": "fd56effc-2019-4e38-a7d3-d799273de0e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "tssc-gitops",
                "resourceVersion": "16306",
                "uid": "2b11d25f-283a-4c75-bbfb-a744822d8ad0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "tssc-gitops",
                "resourceVersion": "16303",
                "uid": "57411959-50a6-4479-b090-70a9f9a10be5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:07Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-applicationset-controller",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "19248",
                "uid": "f6b1a7e2-c727-444a-ac1b-687f0fa1a5a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-applicationset-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-application-controller",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "18712",
                "uid": "095632a5-6edd-49b3-b2ef-f8375b14e03d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-application-controller",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-dex-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-dex-server",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "18659",
                "uid": "57470541-b23b-4f36-8edc-9a35a645b4a3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-dex-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-dex-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-redis",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-redis",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "18788",
                "uid": "6f1e56f6-decb-4fb5-84cf-642e3551197c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-redis"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-redis",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-redis-ha",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-redis-ha",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "18764",
                "uid": "fe0732bd-4318-4add-9ab4-d4fe16afb62b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-redis-ha"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-redis-ha",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "tssc-gitops",
                    "argocds.argoproj.io/namespace": "tssc-gitops",
                    "meta.helm.sh/release-name": "tssc-gitops",
                    "meta.helm.sh/release-namespace": "tssc-gitops"
                },
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "tssc-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "tssc-gitops-argocd-server",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "18736",
                "uid": "5caa0bb4-9398-44f6-be9c-97cf20bf907c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tssc-gitops-argocd-server",
                    "namespace": "tssc-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:02:03Z",
                "name": "tssc-gitops-prometheus-k8s-read-binding",
                "namespace": "tssc-gitops",
                "ownerReferences": [
                    {
                        "apiVersion": "argoproj.io/v1beta1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ArgoCD",
                        "name": "tssc-gitops",
                        "uid": "ef1b2fe7-90f5-47ef-8aa6-dad58fbb2a3e"
                    }
                ],
                "resourceVersion": "18640",
                "uid": "b859de5f-ce20-4423-be7b-7ebd789377bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tssc-gitops-read"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16147",
                "uid": "c03e98aa-fd30-4b95-ab7c-68c897f01f4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16473",
                "uid": "42d40acc-db38-4301-ae24-b8a3d5e32a64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16504",
                "uid": "c427c76c-1bdc-4d74-8cb9-dec01ef0115b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16559",
                "uid": "86595eb5-c162-43f9-b873-968979440afd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16503",
                "uid": "70192222-f1c1-44de-a394-d83f05fc5910"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16475",
                "uid": "45706bdb-faaf-42bc-9119-6f200fc44bb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23982",
                "uid": "93db7acc-2f1d-4937-a69e-f4da982a6636"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23979",
                "uid": "f0d38b88-4af1-44b3-8336-0d837609dd98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:27Z",
                "labels": {
                    "olm.copiedFrom": "rhbk-operator",
                    "olm.managed": "true",
                    "olm.owner": "rhbk-operator.v26.4.11-opr.2",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tssc-keycloak",
                    "olm.permissions.hash": "36jW9QlaNsvzPJGRuCuNRcHk7hOZa26E3ofORt"
                },
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv",
                "namespace": "tssc-keycloak",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhbk-operator.v26.4.11-opr.2",
                        "uid": "fc203fc0-754b-446a-b13a-342e13396dc1"
                    }
                ],
                "resourceVersion": "16894",
                "uid": "50fa731f-5923-4587-8391-5f5423e6ffe9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhbk-operator.v26.4.11-o-2Y3j2KREFP6RVeNbSx2TtLR9lDUD6wYpYdIxdv"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhbk-operator",
                    "namespace": "rhbk-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16300",
                "uid": "97c79c85-cb8c-49c8-a306-7c9541a899de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16297",
                "uid": "2f68f181-c5d8-4589-8d2b-473be77a7c20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "tssc-keycloak",
                "resourceVersion": "16295",
                "uid": "ac1fff8f-5680-4ed5-a5f2-e0022448fb44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-keycloak"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "tssc-tas",
                "resourceVersion": "16141",
                "uid": "a007b220-7f01-46a5-8c4b-9e03f0fc37a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:04:22Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "ctlog",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "ctlog-createtree-job",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "CTlog",
                        "name": "trusted-artifact-signer",
                        "uid": "4e0ba5b6-aecc-4682-8d42-0758e636404b"
                    }
                ],
                "resourceVersion": "23076",
                "uid": "f1acdd07-d52e-449c-95b3-5ec9d58509ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "ctlog-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ctlog-createtree-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-tas",
                "resourceVersion": "16480",
                "uid": "b2b48c47-1994-4f46-b4b4-549ddfc5bf04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-tas",
                "resourceVersion": "16482",
                "uid": "f1e28ae9-9b59-4da1-b9a0-19637f2a1486"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-tas",
                "resourceVersion": "16562",
                "uid": "187f9341-a566-4716-8b33-3d6dfe3cf1e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-tas",
                "resourceVersion": "16493",
                "uid": "d3df5726-c0e7-4bde-9830-bd3d99c92522"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-tas",
                "resourceVersion": "16479",
                "uid": "1157c55f-4772-4171-8ad0-edb4d914be5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:25Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23990",
                "uid": "a4a4a31a-4827-4008-9b5a-a51a93416e82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23987",
                "uid": "7a6d1232-d268-46b2-9739-84cf28bdb2a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:04:22Z",
                "labels": {
                    "app.kubernetes.io/component": "createtree",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "rekor",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "rekor-createtree-job",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Rekor",
                        "name": "trusted-artifact-signer",
                        "uid": "0756b20a-f955-416f-a139-5d4f6df3b4fa"
                    }
                ],
                "resourceVersion": "23122",
                "uid": "908c9b6f-9474-49ad-aa43-3d5350c39377"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rekor-createtree-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rekor-createtree-job",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "tssc-tas",
                "resourceVersion": "16302",
                "uid": "f82150d6-72ff-42fd-85a6-d67ee296632c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "tssc-tas",
                "resourceVersion": "16305",
                "uid": "a71ff24f-3ab3-416c-80d3-8fc511f7e84f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "tssc-tas",
                "resourceVersion": "16284",
                "uid": "aaed12bd-4a2a-4b42-a84f-cfb6936eeb82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:04:22Z",
                "labels": {
                    "app.kubernetes.io/component": "trillian-logsigner",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "trillian-logsigner",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "trillian-logsigner",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Trillian",
                        "name": "trusted-artifact-signer",
                        "uid": "4a35c223-11cf-412d-ae9d-3a78cbe4405a"
                    }
                ],
                "resourceVersion": "22970",
                "uid": "aa7a39e7-58c9-42d1-a1d9-623221c70996"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "trillian-logsigner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trillian-logsigner",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:06:02Z",
                "labels": {
                    "app.kubernetes.io/component": "tuf",
                    "app.kubernetes.io/instance": "trusted-artifact-signer",
                    "app.kubernetes.io/managed-by": "controller-manager",
                    "app.kubernetes.io/name": "tuf-repository-init",
                    "app.kubernetes.io/part-of": "trusted-artifact-signer"
                },
                "name": "tuf-repository-init",
                "namespace": "tssc-tas",
                "ownerReferences": [
                    {
                        "apiVersion": "rhtas.redhat.com/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Tuf",
                        "name": "trusted-artifact-signer",
                        "uid": "0913b536-1def-4173-9e38-a38afa2e311b"
                    }
                ],
                "resourceVersion": "25189",
                "uid": "05a4f99b-5056-43bd-b5b5-20e2114ed195"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "tuf-repository-init"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuf-repository-init",
                    "namespace": "tssc-tas"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:10Z",
                "name": "admin",
                "namespace": "tssc-tpa",
                "resourceVersion": "16190",
                "uid": "6323d5a8-f530-4e2e-acdc-6dc68622844a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc-tpa",
                "resourceVersion": "16481",
                "uid": "064f669b-1e6c-4758-bcdf-6471c7ac4f5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc-tpa",
                "resourceVersion": "16483",
                "uid": "cd7f2947-526a-4c42-9979-6d46de283cdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:17Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc-tpa",
                "resourceVersion": "16507",
                "uid": "5163ce85-1274-4440-94df-85d26a3a7bee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc-tpa",
                "resourceVersion": "16499",
                "uid": "adde6189-28df-43bc-a8b4-3f2fcf6bbd87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:16Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc-tpa",
                "resourceVersion": "16470",
                "uid": "3f1ae499-21dc-4760-93a0-51c129d99d7a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:25Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23998",
                "uid": "3a51f6df-84c1-4735-9f3b-14693f616de0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:25Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23995",
                "uid": "20f370cc-2447-4f76-86c5-28835e05898d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:22Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-get-ingress",
                "namespace": "tssc-tpa",
                "resourceVersion": "16714",
                "uid": "50a2e53e-4ed3-464c-8258-135cf641fe38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "allow-get-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "placeholder"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:22Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator-bind-job",
                "namespace": "tssc-tpa",
                "resourceVersion": "16704",
                "uid": "64b37ee1-4e3c-445c-b7a3-1c81d0483605"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "role-job"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:22Z",
                "labels": {
                    "olm.managed": "true"
                },
                "name": "rhtpa-operator.v1.1.4",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v2",
                        "blockOwnerDeletion": false,
                        "controller": true,
                        "kind": "OperatorCondition",
                        "name": "rhtpa-operator.v1.1.4",
                        "uid": "4e0609b4-8f1f-4781-b3bb-2dced8c117ca"
                    }
                ],
                "resourceVersion": "16705",
                "uid": "cd9a7827-8386-4ea2-97e1-b76f193ce33d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.4"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:24Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "rhtpa-operator.v1.1.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tssc-tpa",
                    "olm.permissions.hash": "ayWt7Ra7j6VaUOWVVnLRSjaZXaH1qykCBmO9pt",
                    "operators.coreos.com/rhtpa-operator.tssc-tpa": ""
                },
                "name": "rhtpa-operator.v1.1.4-rh-9EPBNtJmIseN8im3zaeTeU1HSeu9dzpBfcfFBN",
                "namespace": "tssc-tpa",
                "ownerReferences": [
                    {
                        "apiVersion": "operators.coreos.com/v1alpha1",
                        "blockOwnerDeletion": false,
                        "controller": false,
                        "kind": "ClusterServiceVersion",
                        "name": "rhtpa-operator.v1.1.4",
                        "uid": "eae29198-9727-4c40-b3b3-21aaa5f10b71"
                    }
                ],
                "resourceVersion": "17194",
                "uid": "adbf4795-15a5-479d-80a1-0a7d3d6c5119"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "Role",
                "name": "rhtpa-operator.v1.1.4-rh-9EPBNtJmIseN8im3zaeTeU1HSeu9dzpBfcfFBN"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rhtpa-operator-controller-manager",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:deployers",
                "namespace": "tssc-tpa",
                "resourceVersion": "16316",
                "uid": "9d270901-fb04-422a-8892-cebe70fb9afd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-builders",
                "namespace": "tssc-tpa",
                "resourceVersion": "16317",
                "uid": "3b9a51b2-bfc8-4e02-930c-298321cf6f1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:11Z",
                "name": "system:image-pullers",
                "namespace": "tssc-tpa",
                "resourceVersion": "16318",
                "uid": "01085f9b-b91c-4ab1-8e67-52130fa25f0a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc-tpa"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "dedicated-admin-serviceaccounts-0",
                "namespace": "tssc",
                "resourceVersion": "16021",
                "uid": "bdfc3220-b372-47ca-beef-5d45fd16caa1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "dedicated-admin-serviceaccounts-1",
                "namespace": "tssc",
                "resourceVersion": "16005",
                "uid": "b9931450-5e5b-4119-bf7a-aca9b90f3d76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "dedicated-admins-0",
                "namespace": "tssc",
                "resourceVersion": "16020",
                "uid": "82545043-62e9-4740-a61b-193b0fabcd86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-project"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "dedicated-admins-1",
                "namespace": "tssc",
                "resourceVersion": "16017",
                "uid": "8301892c-3a28-4eda-8758-4d394265a62e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "dedicated-admins-alert-routing-edit-0",
                "namespace": "tssc",
                "resourceVersion": "16018",
                "uid": "67854c64-6947-4f58-ae8a-7e4d166617ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-routing-edit"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "openshift-pipelines-edit",
                "namespace": "tssc",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23957",
                "uid": "6d7e0dfe-eccd-4780-8fbe-925178f23263"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-12T18:05:24Z",
                "name": "pipelines-scc-rolebinding",
                "namespace": "tssc",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "rhosp-rbac-vbcmj",
                        "uid": "17638059-53f8-4ff5-aae2-f7635448f035"
                    }
                ],
                "resourceVersion": "23954",
                "uid": "56eb2bd7-6aa8-41ab-8a0e-0913c2e102ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows deploymentconfigs in this namespace to rollout pods in this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "system:deployers",
                "namespace": "tssc",
                "resourceVersion": "16022",
                "uid": "cccd2e1a-a061-4db5-bb1e-8a651faf41dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows builds in this namespace to push images to this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "system:image-builders",
                "namespace": "tssc",
                "resourceVersion": "16019",
                "uid": "f106261b-187f-4921-bddb-b1675d4caf35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "builder",
                    "namespace": "tssc"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "RoleBinding",
            "metadata": {
                "annotations": {
                    "openshift.io/description": "Allows all pods in this namespace to pull images from this namespace.  It is auto-managed by a controller; remove subjects to disable."
                },
                "creationTimestamp": "2026-05-12T18:01:05Z",
                "name": "system:image-pullers",
                "namespace": "tssc",
                "resourceVersion": "16023",
                "uid": "158fe42a-a187-4b48-9732-17b36695267a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:tssc"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
